Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft

Size: px
Start display at page:

Download "Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft"

Transcription

1 Decentralized Identity for a Decentralized World Alex Simons Partner Director Program Management, Identity Division Microsoft

2 Today Your Identity == App(username, password)

3 However u s e r n a m e Your Identity > App(username, password)

4 Identity is everything you do achievements purchases education u s e r n a m e play interests work citizenship Your Identity > App(username, password)

5 But our identities are strewn across apps and services achievements purchases u s e r n a m e education play interests work citizenship Your Identity > App(username, password)

6 As a result, our identities are at risk! Unauthorized use or personal data Endless breaches of personal data Billions spent on audits Your Identity App(username, password)

7 Customer needs and asks Individuals Privacy and control of my identity and data Protection from hacks Protection from breaches Organizations Trust, but Verify Collaborate with everyone Reduce risk for GDPR, KYC/AML Governments ID for cross border & agency Digital ID for refugees Social and financial inclusion for everyone

8 User in control achievements purchases u s e r n a m e education play interests work citizenship

9 User in control u s e r n a m e

10 Incubation Hypothesis for Decentralized ID Each of us needs a digital identity we own, one which securely and privately stores all elements of our digital identity. This self-owned identity must seamlessly integrate into our lives and give us complete control over how our identity data is accessed and used.

11 Proof of Concept Own and control your Identity

12 The User Agent generates keys Identity Hub Universal Resolver User User Agent Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

13 Alice creates a Digital ID on the blockchain Identity Hub Universal Resolver User User Agent Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

14 The Blockchain returns Alice s Decentralized ID (DID) identifier Identity Hub Universal Resolver User User Agent DID://<string> Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

15 Alice signs in using her student credentials Identity Hub User Agent Universal Resolver User University Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

16 and requests a digital diploma Identity Hub Please send a Digital Diploma User Agent Universal Resolver User University Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

17 The University requests Alice s Digital ID Identity Hub Please send your Digital ID User Agent Universal Resolver User University Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

18 The User Agent discloses the Digital ID to the University Identity Hub User Agent Universal Resolver User DID://<string> University Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

19 The University sends a digital diploma signed with it s digital ID Identity Hub User Agent Universal Resolver User Accept or discard attestation 1 item has been received Signed Diploma from University. Accept attestation? University Allow Deny Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

20 The User Agent signs and stores it in Alice s identity hub Identity Hub User Agent Universal Resolver User University Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

21 Now Alice can present her digital diploma to potential employers and other organizations Identity Hub Present signed diploma Potential Employers & Professional network User Agent Users Universal Resolver Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon

22 In Summary

23 In Summary People, Apps, and Devices Identity Hub Stage: Designs in progress DID Authentication Stage: Designs & Prototypes Users User Agent Stage: Working Implementations Universal Resolver Stage: Alpha Implementation W3C Decentralized Identifiers Stage: Working Implementations Bitcoin via Blockstack Sovrin via Sovrin ledger Ethereum via uport coming soon Distributed Systems Blockchains and Ledgers Join, Collaborate, Contribute CCG

24 Design Principles Users can have one, or more, DIDs based on open standards. DIDs can be resolved across chains: public, private, etc. DID permissions are managed using keys that are accessible only to the user. Identity attributes (or claims) are stored in an off-chain, standards-based Identity Hub. Users can have one, or more, Identity Hubs, stored locally on devices or in the Clouds. User consent is required to access Identity claims supports granular access controls. Claims are compatible with existing standards (Oauth2.0/OIDC).

25 Thank you. Copyright Microsoft Corporation. All rights reserved.

26 The next 3 steps to making the ecosystem real 1. Ease of use Registration Key management Zero-knowledge-proof Compatibility Recovery and revocation

27 The next 3 steps to making the ecosystem real 1. Ease of use 2. Performance & Scale Consistent experience that scales globally from 10s to 100s of thousands per second.

28 The next 3 steps to making the ecosystem real 1. Ease of use 2. Performance & Scale 3. Join, collaborate, and contribute

29 The next 3 steps to making the ecosystem real 1. Ease of use 2. Performance & Scale 3. Join, collaborate, and contribute Thank you. OwnYourIdentity@microsoft.com Copyright Microsoft Corporation. All rights reserved.

30 In Summary People, Apps, and Devices Identity Hub Data off-chain Instances across devices & clouds Schema-based Universal Resolver For a variety of chains Registration Resolution Users User Agent Id + service end-point on-chain Keys generated & stored locally Data encrypted at edge DID Authentication W3C Decentralized Identifiers Bitcoin via Blockstack Ethereum via uport Sovrin via Sovrin ledger coming soon Distributed Systems Blockchains and Ledgers

10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims

10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims 10 minutes, 10 slides, goals, tech details and why it matters Decentralized ID & Verifiable Claims Terminology & Current Model Claim or Assertion a claim or way of communicating what a person or thing

More information

Decentralized IDentifers (DIDs) Markus Sabadello, M.Sc., M.A. Danube Tech, Sovrin Foundation, OASIS XDI TC.

Decentralized IDentifers (DIDs) Markus Sabadello, M.Sc., M.A. Danube Tech, Sovrin Foundation, OASIS XDI TC. Decentralized IDentifers (DIDs) Markus Sabadello, M.Sc., M.A. Danube Tech, Sovrin Foundation, OASIS XDI TC https://danubetech.com/ on Privacy and Linked Data, Vienna, 17th April 2018 Intro: Self-Sovereign

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health

More information

Sovrin: What Goes on the Ledger?

Sovrin: What Goes on the Ledger? Sovrin: What Goes on the Ledger? A white paper from Evernym in cooperation with the Sovrin Foundation. An overview of what s on the Sovrin distributed ledger and why. Andrew Tobin, Evernym Updated September

More information

lifeid Foundation FAQ v.1

lifeid Foundation FAQ v.1 lifeid Foundation FAQ v.1 lifeid Foundation FAQ v.1 1 About the lifeid Foundation 2 1. What is the lifeid Foundation? 2 2. Who is on the lifeid Platform team? 2 3. What is the lifeid Foundation website

More information

Self-Sovereign Identity

Self-Sovereign Identity Whitepaper Self-Sovereign Identity Whitepaper about the Concept of Self-Sovereign Identity including its Potential Version 1.0, 13.10.2017 Andreas Abraham (andreas.abraham@egiz.gv.at) Abstract: This document

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Token Sale Privacy Policy

Token Sale Privacy Policy Token Sale Privacy Policy PRIVACY POLICY LAST UPDATED ON: [11 SEP 2018] A. OVERVIEW You must read the entirety of this Privacy Policy carefully before making any decision to purchase Tokens. You must also

More information

Starflow Token Sale Privacy Policy

Starflow Token Sale Privacy Policy Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through

More information

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security

More information

A New Internet for Decentralized Apps

A New Internet for Decentralized Apps A New Internet for Decentralized Apps ETC Summit 2017-11-13 Hong Kong Larry Salibra A new internet for decentralized apps About Me 1. Core Developer, Blockstack: Blockstack Explorer (AngularJS) Blockstack

More information

Overview of PBI-blockchain cooperation technology

Overview of PBI-blockchain cooperation technology FOR IMMEDIATE RELEASE Biometric authentication technology to realize secure trade on blockchain Enabling IoT payments and automatic transactions through PBI (1) -blockchain cooperation technology Overview

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data

Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Red Flag Regulations

Red Flag Regulations Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this

More information

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) The World s first Public Chain for Decentralized NaaS (Network-as-a-Service) Disclaimer Presentation and the information contained herein is not intended to be a source of advice or credit analysis with

More information

Office 365: Fact Sheet

Office 365: Fact Sheet Office 365: Fact Sheet Microsoft Office 365 from 3C Technology Ltd brings together cloud versions of our most trusted communication and collaboration products with the latest version of our desktop suite.

More information

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

Innovative Authentication method for boosting Mobile Connect global roll-out

Innovative Authentication method for boosting Mobile Connect global roll-out Innovative Authentication method for boosting Mobile Connect global roll-out GB Patent Pending 1803719.2 US Patent Pending 15928348 IPification solution could very well be what is missing to 2018, Shanghai

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

Enabling Open Standards at Scale

Enabling Open Standards at Scale Enabling Open Standards at Scale February 2019 Feng Hou, CIO and Chief Digital Learning Officer, Central New Mexico Community College Alex Kaplan, Global Leader, Strategic Deals, Watson Education; Member,

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Lecture 41 Blockchain in Government III (Digital Identity)

Lecture 41 Blockchain in Government III (Digital Identity) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III

More information

eid Applications Cross Border Authentication

eid Applications Cross Border Authentication eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?

More information

Next Gen Security Technologies for Healthcare Authentication

Next Gen Security Technologies for Healthcare Authentication Next Gen Security Technologies for Healthcare Authentication Session 261, March 8, 2018 Abbie Barbir, Senior Security Adviser, Aetna Brett McDowell, Executive Director, FIDO Alliance 1 Conflict of Interest

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

OneDrive for Business

OneDrive for Business OneDrive for Business Insert Confidentiality Level on title master Personal online file storage, synchronization and sharing OneDrive for Business provides a simple & secure location where people can store,

More information

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security

Compliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED

More information

Android Enterprise Device Management with ZENworks 2017 Update 2

Android Enterprise Device Management with ZENworks 2017 Update 2 Android Enterprise Device Management with ZENworks 2017 Update 2 Article IT Operations Management Article Android Enterprise Device Management with ZENworks 2017 Update 2 Introduction With the release

More information

Hyperledger - Project Overview. January 2018

Hyperledger - Project Overview. January 2018 - Project Overview January 2018 Introducing Open source collaborative effort to advance cross-industry blockchain technologies Hosted by The Linux Foundation, fastest-growing project in LF history Global

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: University of Guelph Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

SOCIAL IDENTITIES IN HIGHER ED: WHY AND HOW WITH REAL-WORLD EXAMPLES

SOCIAL IDENTITIES IN HIGHER ED: WHY AND HOW WITH REAL-WORLD EXAMPLES SOCIAL IDENTITIES IN HIGHER ED: WHY AND HOW WITH REAL-WORLD EXAMPLES Todd Haddaway, University of Maryland, Baltimore County Jacob Farmer, Indiana University Dedra Chamberlin, Cirrus Identity 2015 Internet2

More information

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali

Blockstack, a New Internet for Decentralized Apps. Muneeb Ali Blockstack, a New Internet for Decentralized Apps Muneeb Ali The New Internet Problems with the traditional internet End-to-end design principle for the Internet. *1981 Saltzer, Reed, and Clark paper End-to-end

More information

Yada. A blockchain-based social graph

Yada. A blockchain-based social graph Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure

More information

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN SESSION ID: GPS-R09B BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN Sid Desai Head of Business Development Remme.io @skd_desai Agenda Our relationship to our digital-selves Evolution of Authentication

More information

Administering a SQL Database Infrastructure (M20764)

Administering a SQL Database Infrastructure (M20764) Administering a SQL Database Infrastructure (M20764) COURSE OVERVIEW: In this Microsoft online training course, you will learn the skills required to maintain a Microsoft SQL Server 2012 or 2014 database

More information

User-Managed Access (UMA)

User-Managed Access (UMA) User-Managed Access (UMA) Joni Brennan, Kantara Managing Director Eve Maler, PayPal, UMA WG chair ITU-T Q10/17 Identity Summit 10 December 2010 (feel free to send questions to @xmlgrrl) 1 Privacy is not

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

Last updated 31 March 2016 This document is publically available at

Last updated 31 March 2016 This document is publically available at PRIVACY POLICY Last updated 31 March 2016 This document is publically available at http://www.conexusfinancial.com.au/privacy 1. INTRODUCTION This Privacy Policy sets out our commitment to protecting the

More information

Granting, Changing, or Rescinding Your FERPA Permissions

Granting, Changing, or Rescinding Your FERPA Permissions Granting, Changing, or Rescinding Your FERPA Permissions Contents What are FERPA Permissions? How do I grant someone permission to view my information? How do I view permissions I ve granted? How do I

More information

Keynote: The Future of Data Leakage Prevention

Keynote: The Future of Data Leakage Prevention Keynote: The Future of Data Leakage Prevention ISSS Zürcher Tagung 2010 1.6.2010, WIDDER Hotel, Zürich Sandy Porter Head of Identity and Security, Avoco Secure Information Security Society Switzerland

More information

Are You Avoiding These Top 10 File Transfer Risks?

Are You Avoiding These Top 10 File Transfer Risks? Are You Avoiding These Top 10 File Transfer Risks? 1. 2. 3. 4. Today s Agenda Introduction 10 Common File Transfer Risks Brief GoAnywhere MFT Overview Question & Answer HelpSystems Corporate Overview.

More information

Digital Trust Ecosystem

Digital Trust Ecosystem Digital Trust Ecosystem IoT Risks and Solutions Chris Edwards CTO - Intercede What s the Problem? Billions of devices Millions of services Mixed closed / open trust networks Devices transferring between

More information

White Paper. Blockchain alternatives: The case for CRAQ

White Paper. Blockchain alternatives: The case for CRAQ White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

Decentralized Identity - What Lies Ahead of Us: The Open (Interesting) Research Issues

Decentralized Identity - What Lies Ahead of Us: The Open (Interesting) Research Issues Decentralized Identity - What Lies Ahead of Us: The Open (Interesting) Research Issues Nathan Aw Ming Kun For The Decentralized Internet Infrastructure Research Group (DINRG) at the IETF 103, Bangkok on

More information

Data Security and Privacy at Handshake

Data Security and Privacy at Handshake Data Security and Privacy at Handshake Introduction 3 A Culture of Security 3 Employee Background Checks 3 Dedicated Security and Privacy Teams 3 Ongoing Team Training 4 Compliance 4 FERPA 4 GDPR 4 Security

More information

Product Brief. Circles of Trust.

Product Brief. Circles of Trust. Product Brief Circles of Trust www.cryptomill.com product overview Circles of Trust is an enterprise security software system that eliminates the risks associated with data breaches from a hacker attack

More information

Requirements for DIDs (Decentralized Identifiers)

Requirements for DIDs (Decentralized Identifiers) Requirements for DIDs (Decentralized Identifiers) A Requirement from Rebooting the Web of Trust II: ID2020 Design Workshop by Drummond Reed and Les Chasen, Respect Network 1. INTRODUCTION Respect Network

More information

2. Who we collect information (data) from & why we collect it

2. Who we collect information (data) from & why we collect it 1. Introduction Our Privacy Policy applies to the personal data that Ambrey collects and uses. References in this Privacy Policy to Ambrey, we, us or our mean Ambrey Limited and the Ambrey Group of companies:

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that

More information

Trustworthy user authentication, authorization, data integrity AND consent management

Trustworthy user authentication, authorization, data integrity AND consent management RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY

More information

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland.

PRIVACY STATEMENT +41 (0) Rue du Rhone , Martigny, Switzerland. PRIVACY STATEMENT +41 (0) 225349799 www.energymarketprice.com Rue du Rhone 5 1921, Martigny, Switzerland dpo@energymarketprice.com Introduction Your privacy and trust are important to us and this Privacy

More information

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

Exceptional Access Protocols. Alex Tong

Exceptional Access Protocols. Alex Tong Exceptional Access Protocols Alex Tong Motivation Crypto Wars FBI vs. Apple What is the job of engineers? Requirements Government Decryption without notice to the user Ubiquitous international capability

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly 2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly please download the guide at https://otalliance.org/incident 2017 Cyber Incident & Breach Readiness Webinar Craig Spiezle Executive Director

More information

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Managing Your Privileged Identities: The Choke Point of Advanced Attacks Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

If you have any questions or concerns about this Privacy Policy, please Contact Us.

If you have any questions or concerns about this Privacy Policy, please Contact Us. Illuminate Education Your Privacy Rights Are Important To Us The privacy of students and their parents and guardians is important to Illuminate Education, Inc. ( Illuminate ) and the teachers, administrators,

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx Health Data & Blockchain: The New Sharing Frontier Michael Dillhyon, CCO, Graftworx Twitter: @SwissGator Overview Who? Background Why? Enterprise & Consumer Benefit What? (Blockchain of course) Value Prop

More information

EMERGING TRENDS IN WHITE COLLAR CRIMES

EMERGING TRENDS IN WHITE COLLAR CRIMES EMERGING TRENDS IN WHITE COLLAR CRIMES Presented by: Collins Ojiambo Were CISA, CISM, Mciarb, AVSEC PMC Country Lead, Kroll Associates Thursday 24 th October 2018 Credibility. Professionalism. AccountAbility

More information

Blockchain (de)constructed

Blockchain (de)constructed Blockchain (de)constructed Fritz Henglein Department of Computer Science, University of Copenhagen (DIKU) DIKU Business Club meeting on blockchain January 11th, 2016 Fritz Henglein Professor of programming

More information

INVESTOR PRIMER FOR PUBLIC CIRCULATION 2018

INVESTOR PRIMER FOR PUBLIC CIRCULATION 2018 INVESTOR PRIMER FOR PUBLIC CIRCULATION 2018 Overview PROTOCOL #1 TOKENIZATION PROTOCOL An end-to-end protocol for tokenization of assets across both the Stellar and Ethereum networks PROTOCOL #2 CROSS-CHAIN

More information

A Public Database for the Planet

A Public Database for the Planet A Public Database for the Planet Trent McConaghy @trentmc0 Motivation Here s your personal data My conclusion is that whatever you put on the internet you lose it. Maybe keep the rights, but lose the

More information

OneID An architectural overview

OneID An architectural overview OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities

More information

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain Merritt Maxim Principal Analyst Forrester Martijn Loderus Director & Global Practice Partner for Advisory Consulting Janrain Merritt and Martijn will share insights on Digital Transformation & Drivers

More information

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich

More information

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE SECURITY THAT FOLLOWS YOUR FILES ANYWHERE SOLUTIONS FOR EVERY INDUSTRY VERA FOR FINANCIAL SERVICES Financial services firms are more likely to be targeted in a cyberattack than other organizations. Changes

More information

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE PRIVACY NOTICE Nestlé Purina Petcare Limited (hereinafter referred to as Nestlé ) is committed to safeguarding your privacy and ensuring that you continue to trust Nestlé with your personal data. When

More information

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

RippleMatch Privacy Policy

RippleMatch Privacy Policy RippleMatch Privacy Policy This Privacy Policy describes the policies and procedures of RippleMatch Inc. ( we, our or us ) on the collection, use and disclosure of your information on https://www.ripplematch.com/

More information

The ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered

The ID Concierge. Identity Credentials. Solutions GUIDE. Identity as a Service Suite (IDaaSS) great looking secure ID credentials delivered The Identity as a Service Suite (IDaaSS) Solutions GUIDE Identity Credentials great looking secure ID credentials delivered www.idconcierge.com.au www.nxient.com nxient s Identity as a Service Suite (IDaaSS)

More information

Mobile Identity as key enabler for the Digital Consumer

Mobile Identity as key enabler for the Digital Consumer GNation #Better Future for Leisure Mobile Identity as key enabler for the Digital Consumer Mr. John Tsang Chairman BENEFIT VANTAGE LIMITED (IPification) IPification solution could very well be what is

More information

How Secure is Blockchain? June 6 th, 2017

How Secure is Blockchain? June 6 th, 2017 How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones

More information

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial

More information

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018 Our Commitment To Privacy PRIVACY POLICY Last Modified July 26, 2018 Please read this Privacy Policy carefully before using this online entertainment service. Access to and use of this online entertainment

More information

Identity Management on the Blockchain

Identity Management on the Blockchain Identity Management on the Blockchain Julian Roos Advisor: Heiko Niedermayer Seminar Innovative Internet Technologies and Mobile Communications Chair of Network Architectures and Services Departments of

More information

Use EMS to protect your mobile data and mobile app

Use EMS to protect your mobile data and mobile app Use EMS to protect your mobile data and mobile app Peter Daalmans Senior Consultant, Enterprise Mobility MVP CTGlobal. pds@ctglobalservices.com PETER DAALMANS Enterprise Mobility MVP @ CTGlobal Blog: https://peterdaalmans.com

More information

Lecture 44 Blockchain Security I (Overview)

Lecture 44 Blockchain Security I (Overview) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Prof. Praveen Jayachandran Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 44 Blockchain

More information

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker Biomedical Security Erwin M. Bakker Some Security News October 03, 2018 - Hackers attacking healthcare through remote access systems and disrupting operations is the number one patient safety risk, according

More information

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011 Identity management Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline 1. Single sign-on 2. OpenId 3. SAML and Shibboleth 4. Corporate IAM 5. Strong identity 2

More information

Skype for Business. Improve your team s productivity

Skype for Business. Improve your team s productivity Skype for Business Improve your team s productivity Presented by Biren Shukla, President & CEO Forum Info-Tech About Forum Info-Tech Working as a trusted partner since 2005, Forum Info-Tech is a B2B company

More information

in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012

in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 Identity Management and Federation of Identity in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 HRSDC - National Service Delivery HRSDC and its service

More information

Helping you to be GDPR compliant

Helping you to be GDPR compliant Helping you to be GDPR compliant Helping you to be GDPR compliant 01 Privacy Compliance Dashboard Your campaign Privacy Compliance Dashboard is a transparent view where you identify the contact information

More information