SlideShare a Scribd company logo
1 of 76
Download to read offline
INTERNET IDENTITY WORKSHOP | October 2019
Heather Vescent, Karyl Fowler, & Lucas Tétreault
SSI 101
• Heather Vescent, @heathervescent
CEO, The Purple Tornado & Author of Comprehensive Guide to SSI
• Karyl Fowler, @TheKaryl
CEO, Transmute
• Lucas Tétreault, @Ltetreault
VP, R&D Vivvo
Who are we?
+ How we got into Decentralized Identity
• Why SSI?
• Identity Models
• DIDs
• Emerging SSI stack standards
• Transmute & Vivvo examples
• Q&A
Agenda
The Vision: A Global Digital Rail
• Technology standards for interoperability
• Trans-National, goes beyond borders
• Governments supported development of new infrastructure by
private sector
• Government of Canada
• DHS investments
• Citizens access Government services without being tracked or
correlated
• Identity issuance and verification
• Digitally native identity and credentials
• What else is possible?
DIGITAL IDENTITY MODELS
1: Centralized Identity
You
1: Centralized Identity
You
2: Federated Identity
You Identity
Providers
Standards:
Applications
2: Federated Identity
You Identity
Providers
Standards:
Applications
Centralized vs Federated Identity
Centralized
Centralized vs Federated Identity
Federated
Today’s problems
• Data collected to create detailed profiles
• User doesn’t own data or decides how it’s used
• Difficult to delegate access and share data
• Users can’t control how their data is secured
(or how notified if there is a breach)
• + UN/PW databases are an attack surface
3: Decentralized Identity
Wallet
Blockchain or Distributed Leger
3: Decentralized Identity
Wallet
ID
Consumer
(Verifier)
Blockchain or Distributed Leger
3: Decentralized Identity
Wallet
ID
Consumer
(Verifier)
Blockchain or Distributed Leger
3: Decentralized Identity
Wallet
ID Issuer
ID
Consumer
(Verifier)
Blockchain or Distributed Leger
Legal Identity
Things Identity
STANDARDS & SPECIFICATIONS
Ideas
(2-10 years)
Incubation
(6-18 months)
Refinement
(1-3 years)
Standardization
(~18-24 months)
Conversations Papers Experiments,
Specifications, & Pilots
Standards
W3C Community
Groups
Rebooting the Web
of Trust
Interoperable standards to
implement a common
technology stack.
• DID Spec
• DID Methods
• Universal Resolver
• DID Auth
• Verifiable Credentials
Standards & Specs
What is a Decentralized Identifier?
• New type of identifier for verifiable, "self-sovereign" digital identity
• Fully under the control of the DID subject, enabling independence
from any specific:
– centralized registry
– identity provider
– certificate authority
• URL enabling trustable interactions with DID subject
DIDs resolve to DID Documents
• DIDs resolve to DID Documents
• DID Documents contain verification methods and service endpoints for interacting with
the DID subject
• A verification method is a way of verifying a particular type of DID interaction, such as:
– Performing authentication
– Secure service endpoint
DID Document{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"publicKey": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaSigningKey2018",
"owner": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn"
}],
"authentication": [{
"type": "RsaSignatureAuthentication2018",
"publicKey": "did:example:123456789abcdefghi#keys-1"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}],
"created": "2002-10-10T17:00:00Z",
"updated": "2016-10-17T02:41:00Z",
”proof": {
"type": "RsaSignature2018",
"created": "2016-02-08T16:02:20Z",
"creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1",
”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0
yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/
gi25s=”
}
}
DID Document – DID{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"publicKey": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaSigningKey2018",
"owner": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn"
}],
"authentication": [{
"type": "RsaSignatureAuthentication2018",
"publicKey": "did:example:123456789abcdefghi#keys-1"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}],
"created": "2002-10-10T17:00:00Z",
"updated": "2016-10-17T02:41:00Z",
”proof": {
"type": "RsaSignature2018",
"created": "2016-02-08T16:02:20Z",
"creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1",
”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0
yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/
gi25s=”
}
}
DID Document – public key{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"publicKey": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaSigningKey2018",
"owner": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn"
}],
"authentication": [{
"type": "RsaSignatureAuthentication2018",
"publicKey": "did:example:123456789abcdefghi#keys-1"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}],
"created": "2002-10-10T17:00:00Z",
"updated": "2016-10-17T02:41:00Z",
”proof": {
"type": "RsaSignature2018",
"created": "2016-02-08T16:02:20Z",
"creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1",
”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0
yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/
gi25s=”
}
}
DID Document – service endpoint{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"publicKey": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaSigningKey2018",
"owner": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn"
}],
"authentication": [{
"type": "RsaSignatureAuthentication2018",
"publicKey": "did:example:123456789abcdefghi#keys-1"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}],
"created": "2002-10-10T17:00:00Z",
"updated": "2016-10-17T02:41:00Z",
”proof": {
"type": "RsaSignature2018",
"created": "2016-02-08T16:02:20Z",
"creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1",
”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0
yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/
gi25s=”
}
}
DID Document – date{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"publicKey": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaSigningKey2018",
"owner": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn"
}],
"authentication": [{
"type": "RsaSignatureAuthentication2018",
"publicKey": "did:example:123456789abcdefghi#keys-1"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}],
"created": "2002-10-10T17:00:00Z",
"updated": "2016-10-17T02:41:00Z",
”proof": {
"type": "RsaSignature2018",
"created": "2016-02-08T16:02:20Z",
"creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1",
”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0
yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/
gi25s=”
}
}
DID Document – proof{
"@context": "https://w3id.org/did/v1",
"id": "did:example:123456789abcdefghi",
"publicKey": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "RsaSigningKey2018",
"owner": "did:example:123456789abcdefghi",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn"
}],
"authentication": [{
"type": "RsaSignatureAuthentication2018",
"publicKey": "did:example:123456789abcdefghi#keys-1"
}],
"service": [{
"type": "ExampleService",
"serviceEndpoint": "https://example.com/endpoint/8377464"
}],
"created": "2002-10-10T17:00:00Z",
"updated": "2016-10-17T02:41:00Z",
”proof": {
"type": "RsaSignature2018",
"created": "2016-02-08T16:02:20Z",
"creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1",
”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0
yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/
gi25s=”
}
}
DID Methods
Active DID Method Specs
Method DID Prefix
Bitcoin did:btcr
Blockstack did:stack
Element - Sidetree did:elem
Ethereum uPort did:ethr
Github DID did:github
IPFS did:ipld
Sovrin did:soc
Veres One did:v1
• Syntax
• CRUD (Create, Read, Update, Delete) operations
• Applies to DIDs and DID documents
• Specifies distributed ledger (or blockchain)
• Any method-specific elements
DID Method Spec Defines
• Different use cases
• Different capabilities
• Different economic model
Results in different
implementation choices
~25 Different registered DID Methods
on a different ledgers
• Ethereum, Bitcoin
• IPFS
• Fit-for-purpose: Sovrin, Veres One
• No blockchain: Github DID
• Ledger agnostic + scalable:
Sidetree (Element, ION)
• Thought experiments
DID Methods
did:btcr:xkyt-fzgq-qq87-xnhn
Universal Resolver
DID Method Spec
DID Document
DID
Universal Resolver
DID Auth Here is my decentralized
identifier
Prove you own it!
Here’s my proof! Come on in!
Resolves the DID
Document
Creates proof
Verified Credentials
Wallet
Issuer
Blockchain or Distributed Leger
Verifier
Verified Credentials
Wallet
Issuer
Blockchain or Distributed Leger
Verifier
Verified Credentials
Wallet
Issuer
Blockchain or Distributed Leger
Verifier
Verified Credentials
Wallet
Issuer
Blockchain or Distributed Leger
Verifier
Verified Credentials
Wallet
Issuer
Blockchain or Distributed Leger
Verifier
Verified Credentials
Wallet
Issuer
Blockchain or Distributed Leger
Verifier
GitHub DID
BLOCKCHAIN NOT REQUIRED
41
• Development tool for working with DIDs that
leverages, github for easy setup without the need
to run a ledger.
• Supports fast development of DID Verifiable
credentials, and new signature suites
• Supports a CLI, Web App, API and standard
Library Providing useful templates for getting
started with DIDs.
• Supports OpenPGP Signature Suite, enabling
integration with Yubikey, and legacy mail systems
that use OpenPGP / GPG.
• Interest from GitHub and HyperLedger for use in
interoperable documentation.
• Supports demo’s for sign, verify, encrypt and
decrypt with DIDs.
• Supports a standard wallet file, with
interoperability with Element and Transmute ID.
Interop Project
TRANSMUTE LEADS THE
42
• Demonstrate Interoperability across DID
Methods, Websites, Agents, Hubs, Identity
Wallets and Verifiable Credentials
• Provides insight into gaps and opportunities for
partnership in the ecosystem.
• Transmute is the leader of this initiative, and
assists the working groups in providing clarity
around interoperability.
TRANSMUTE
Karyl Fowler, CEO
OUR PROBLEM
44
The Enterprise Identity Crisis
describes today’s environment where
as companies grow, their risk grows
disproportionately.
Collaborate Without Compromise
Transmute ID integrates with your existing infrastructure, grows with your business
and minimizes friction between you and your customers – the fastest path to new
revenue.
45
THE SSI-ENABLED ENTERPRISE
THE SOLUTION
Scalability of Cloud +
Security of Decentralized Public Key Cryptography
+ Automated Tracking on Blockchain
46
Enterprise IDP
Architecture
Transmute Workflow Engine: Open and Closed Source Components
Integrations
Enterprise Storage Decentralized Infrastructure
+ Add your
own
Major enterprise systems like… Major cloud providers like… Leading DLT solutions like…
+ Add you
own
+ Add your
own
47
Transmute Workflow Engine
48
48
FRAMEWORK FOR ADOPTION
1. Is selective disclosure or privacy a priority?
2. Is there high coordination burden?
3. Is traceability or auditability important?
Application Areas
Chains of Custody
Commercial + Defense Supply Chain Logistics
Cold Chain (pharma to agriculture)
Contract Management (Legal, HR, Real Estate)
Software
Data Infrastructure &
Governance_
Cloud roles + access management_
Microservices monitoring_
Telco
5G + IoT Enablement
Identity/Data-as-a-Service
Anti-Fraud (verification + roaming)
Healthcare_
Insurance + Billing_
Patient-centric data sharing + management_
49
LOGISTICS APPLICATION
Transmute ID combines the security advantages of user-
managed access and verified credentials to safely manage
identities across your enterprise ecosystem.
50
Kantara Initiative
PARTNERSHIPS
51
• Transmute engages with the
Kantara member network to
demonstrate implementations of
the mutual Consent Receipt
standard, which supports
emergent data and privacy
regulations like GDPR.
• Kantara’s Trust Services
Interoperability groups work “at
the intersection of digital identity,
personal data agency and
usability.”
CONSENT RECEIPT FLOW EXAMPLE
Ledger agnostic protocol for anchoring
batches of signed JSON Patch
Operations resulting in a DPKI CRDT.
Batching supports higher throughput &
lower cost, but paranoid users can still
anchor themselves.
Open Source Apache-2
Implementations for Bitcoin & Ethereum
supported by the Linux Foundation.
Sidetree Protocol
SCALABILITY
52
A javascript library implementing the
Sidetree Protocol on Ethereum and
IPFS.
Modular, portable and extendable with
support for both in browser (light client)
and full nodes (REST API).
Open Source Apache-2, Created by
Transmute, supported by Microsoft &
the Linux Foundation.
Scalable DPKI is the foundation of
enterprise security applications.
Element
S I D E T R E E
52
RESOLUTION
A kind of reverse anchoring:
ledger -> anchor -> batch -> operation
=> did document
Data Poisoning, Spam and Errors:
How do trusted nodes handle bad data?
Why resolve a DID?
Signature Verification, Service
Endpoints and the Future of SSI.
WALLET
Hardware, Mobile, Web, API, Trusted
Execution Environment?
JWS vs JSON-LD Signatures, the case
for JSON-LD.
Shamir, Recovery and Usability.
Not all keys need to be in the same
place!
ANCHORING
CRUD
Signed
Operation
Batch File
Anchor File
Signed Ledger Transaction
CRUD
Signed
Operation
CRUD
Signed
Operation
Server
Client
IPFS
Ethereum
PouchDB
NanoBus
Storage
Blockchain
SidetreeLight Node
Full Node
ServiceBus
DB
Firestore
Mnemonic
Key System
DID Wallet
Protocol
Functions
Element
A R C H I T E C T U R E
55
Server
Browser
Open Source DID Method
in collaboration with DIF
Members
VIVVO
Lucas Tétreault, VP R&D
Vivvo + SSI
• eGovernment platform that includes identity federation (SP and
IdP), identity proofing, consent and policy management, etc.
• Started hearing rumblings about SSI from Government of Canada
contacts in 2017
• Started investing in SSI in 2018 from a research perspective
• Came to IIW in the fall of 2018 with a pretty early prototype of DID-
Auth and collecting verifiable credentials in a wallet
SSI Use Case: Vivvo + ISED
Business Connect:
- In production with the province of
Saskatchewan since spring 2018
- Identity, business and relationship to
business proofing
- Access government services on behalf
of a business
SSI Use Case: Vivvo + ISED
SSI Use Case: Vivvo + ISED
SSI Use Case: Vivvo + ISED
SSI Use Case: Vivvo + ISED
Vivvo: What has worked well?
“I love the idea of authentication with my phone for all government services
not only for businesses.”
“I liked how the phone app notified me quickly about creating the
credentials in my digital wallet –it was almost instantaneous.”
“What I liked about the functionality tested - no remembering of usernames
and passcodes, information reusable with my consent, the digital wallet
concept.”
Vivvo: Industry Response
• Use of verified identity information on mobile device (i.e. digital wallet) is a
key enabler to easy and secure sharing of business identity among service
providers
• Need for common / standard technology platform to enable re-use of
verified identity information across digital identity providers and
applications.
• Need for education and paradigm shift to increase trust/confidence for
using mobile device for higher risk transactions.
• Perception that mobile device technology is not mature enough (at least in
North America) for digital wallet/payme
Vivvo: Outstanding Challenges
• did:vvo method backed by rest service / relational database
• Our PoC with ISED was more about passwordless auth and
portability of VCs than proving out a DID method and/or DLT
• We are betting big time on interoperability and standardization
THE CURRENT STATE
Many Proof of Concepts
Proof of Concept Use Case Who’s Involved
VON Business Credentials British Columbia Government
CU Ledger Credit Union Banking
Security
Sovrin + Credit Union National
Association
Building Blocks Food Aid World Food Programme
(Syrian Refugee Aid)
Dutch Digital ID Digital ID TU Delft + Dutch Gov + Others
Walmart Supply Chain Food Supply Tracking Walmart + Hyperledger Fabric
TradeLens Shipping Shipping + Tracking IBM + Maersk
Novartis Pharmaceuticals
• Innovative Medicine Initiative Blockchain Enabled Healthcare
• Experimenting with DIDs & Verifiable Credentials since 2016
• Third party risk
– Qualified suppliers: environmental & labor practices + auditing
– IoT: temperature monitoring for data integrity
– Digitized documents: materials certifications, trade documents
• Sharing patient data
– Drug trials
– Patient experience w/ doctors, researchers, and companies
Government Support
• DHS SBIR & SVIP Grants
– Improve Supply Chain Management
– Combat Counterfeit Goods
• Canadian Government Innovation Challenge:
– https://www.ic.gc.ca/eic/site/101.nsf/eng/00068.html
Source: DHS Science and
Technology Directorate's
Testimony before the US House
of Representatives, May 8, 2018
DIF
SSI improves user experience
• Assert an identity or credential digitally
– Could be verified or not
• User collects, shares, controls their own data
– Fine toothed control, read, save, edit the data
– Share verified data anonymously
• Increases privacy, while enabling data sharing
SSI improves Business & Government
• Potential to reduce/eliminate database security risk
• More control over credentials issued, revocation
• Streamline onboarding, increase business efficiency
– Reduce fraud by confirming multiple data points
– Streamline confirmation of compliance data/documentation
• Increase trust of any verified data that must be shared
downstream
– Drug trials
– Compliance documents
– Provenance data
In conclusion
• Users control their identities & data
• Emerging technology for IoT identity
• Business opportunities for digitally native
credentials
• Opportunity to build interoperable infrastructure
• Many companies, governments & communities
are building & investing in it today
Resources
Guide to SSI: https://ssiscoop.com/
W3C Credentials Community Group
https://w3c-ccg.github.io/
W3C DID WG: https://www.w3.org/2019/did-wg/
DIF: http://identity.foundation/
IIW: https://www.internetidentityworkshop.com
SSI Meetup: http://ssimeetup.org
RWOT: https://www.weboftrust.info/
INTERNET IDENTITY WORKSHOP | October 2019
Heather Vescent, Karyl Fowler, & Lucas Tétreault
SSI 101

More Related Content

What's hot

What's hot (20)

The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Integrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation ProtocolsIntegrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation Protocols
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
自己主権型IDと分散型ID
自己主権型IDと分散型ID自己主権型IDと分散型ID
自己主権型IDと分散型ID
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
 
OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)
 
Secure your app with keycloak
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloak
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 

Similar to Introduction to Self Sovereign Identity - IIW October 2019

BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat Security Conference
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
PECB
 

Similar to Introduction to Self Sovereign Identity - IIW October 2019 (20)

Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
Despite both sides having different benefits and tradeoffs, DeFi and CeFi are...
Despite both sides having different benefits and tradeoffs, DeFi and CeFi are...Despite both sides having different benefits and tradeoffs, DeFi and CeFi are...
Despite both sides having different benefits and tradeoffs, DeFi and CeFi are...
 
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Technologies and Innovation – The Internet of Value
Technologies and Innovation – The Internet of ValueTechnologies and Innovation – The Internet of Value
Technologies and Innovation – The Internet of Value
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Microsoft Bluehat 2017: Mobile SSL Interception
Microsoft Bluehat 2017: Mobile SSL InterceptionMicrosoft Bluehat 2017: Mobile SSL Interception
Microsoft Bluehat 2017: Mobile SSL Interception
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
 
OpenAM as Flexible Integration Component
OpenAM as Flexible Integration ComponentOpenAM as Flexible Integration Component
OpenAM as Flexible Integration Component
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 

More from Heather Vescent

Personal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by HeathervescentPersonal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by Heathervescent
Heather Vescent
 
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Heather Vescent
 
A New Perspective, to solve the world's problems
A New Perspective, to solve the world's problemsA New Perspective, to solve the world's problems
A New Perspective, to solve the world's problems
Heather Vescent
 

More from Heather Vescent (20)

Deep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and DemocracyDeep Fakes, Digital Identity and Democracy
Deep Fakes, Digital Identity and Democracy
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
An Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information OperationsAn Introduction to Maskirovka aka Information Operations
An Introduction to Maskirovka aka Information Operations
 
Self-Sovereign Identity: An Analysis using Appreciative Inquiry
Self-Sovereign Identity: An Analysis using Appreciative Inquiry Self-Sovereign Identity: An Analysis using Appreciative Inquiry
Self-Sovereign Identity: An Analysis using Appreciative Inquiry
 
Payments in the Sharing Economy, Total Payments, Melbourne, Australia
Payments in the Sharing Economy, Total Payments, Melbourne, AustraliaPayments in the Sharing Economy, Total Payments, Melbourne, Australia
Payments in the Sharing Economy, Total Payments, Melbourne, Australia
 
Payments and the Sharing Economy - Toronto
Payments and the Sharing Economy - TorontoPayments and the Sharing Economy - Toronto
Payments and the Sharing Economy - Toronto
 
What is the Future?
What is the Future?What is the Future?
What is the Future?
 
Increasing Women in STEM
Increasing Women in STEMIncreasing Women in STEM
Increasing Women in STEM
 
Payments and the Sharing Economy
Payments and the Sharing EconomyPayments and the Sharing Economy
Payments and the Sharing Economy
 
Biometric & Identity: Beyond Wearables - Sxsw 2015
Biometric & Identity: Beyond Wearables - Sxsw 2015Biometric & Identity: Beyond Wearables - Sxsw 2015
Biometric & Identity: Beyond Wearables - Sxsw 2015
 
Personal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by HeathervescentPersonal Branding 2014 Update by Heathervescent
Personal Branding 2014 Update by Heathervescent
 
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
Bankinter Future Trends Forum 2014 - Future of Currency Recap by Heather Schl...
 
The New Age of Technology Enhanced Intimacy
The New Age of Technology Enhanced IntimacyThe New Age of Technology Enhanced Intimacy
The New Age of Technology Enhanced Intimacy
 
A New Perspective, to solve the world's problems
A New Perspective, to solve the world's problemsA New Perspective, to solve the world's problems
A New Perspective, to solve the world's problems
 
A Possibility Tour by heathervescent
A Possibility Tour by heathervescentA Possibility Tour by heathervescent
A Possibility Tour by heathervescent
 
Solving the World's Problems
Solving the World's ProblemsSolving the World's Problems
Solving the World's Problems
 
Towards a clarification of terms
Towards a clarification of termsTowards a clarification of terms
Towards a clarification of terms
 
The Demographic Transition: A Systems Model
The Demographic Transition: A Systems ModelThe Demographic Transition: A Systems Model
The Demographic Transition: A Systems Model
 
The Future of Shopping
The Future of ShoppingThe Future of Shopping
The Future of Shopping
 
Making Near Future Video Scenarios
Making Near Future Video ScenariosMaking Near Future Video Scenarios
Making Near Future Video Scenarios
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Introduction to Self Sovereign Identity - IIW October 2019

  • 1. INTERNET IDENTITY WORKSHOP | October 2019 Heather Vescent, Karyl Fowler, & Lucas Tétreault SSI 101
  • 2. • Heather Vescent, @heathervescent CEO, The Purple Tornado & Author of Comprehensive Guide to SSI • Karyl Fowler, @TheKaryl CEO, Transmute • Lucas Tétreault, @Ltetreault VP, R&D Vivvo Who are we? + How we got into Decentralized Identity
  • 3. • Why SSI? • Identity Models • DIDs • Emerging SSI stack standards • Transmute & Vivvo examples • Q&A Agenda
  • 4. The Vision: A Global Digital Rail • Technology standards for interoperability • Trans-National, goes beyond borders • Governments supported development of new infrastructure by private sector • Government of Canada • DHS investments • Citizens access Government services without being tracked or correlated • Identity issuance and verification • Digitally native identity and credentials • What else is possible?
  • 8. 2: Federated Identity You Identity Providers Standards: Applications
  • 9. 2: Federated Identity You Identity Providers Standards: Applications
  • 10. Centralized vs Federated Identity Centralized
  • 11. Centralized vs Federated Identity Federated
  • 12. Today’s problems • Data collected to create detailed profiles • User doesn’t own data or decides how it’s used • Difficult to delegate access and share data • Users can’t control how their data is secured (or how notified if there is a breach) • + UN/PW databases are an attack surface
  • 16. 3: Decentralized Identity Wallet ID Issuer ID Consumer (Verifier) Blockchain or Distributed Leger
  • 20. Ideas (2-10 years) Incubation (6-18 months) Refinement (1-3 years) Standardization (~18-24 months) Conversations Papers Experiments, Specifications, & Pilots Standards W3C Community Groups Rebooting the Web of Trust
  • 21. Interoperable standards to implement a common technology stack. • DID Spec • DID Methods • Universal Resolver • DID Auth • Verifiable Credentials Standards & Specs
  • 22. What is a Decentralized Identifier? • New type of identifier for verifiable, "self-sovereign" digital identity • Fully under the control of the DID subject, enabling independence from any specific: – centralized registry – identity provider – certificate authority • URL enabling trustable interactions with DID subject
  • 23. DIDs resolve to DID Documents • DIDs resolve to DID Documents • DID Documents contain verification methods and service endpoints for interacting with the DID subject • A verification method is a way of verifying a particular type of DID interaction, such as: – Performing authentication – Secure service endpoint
  • 24. DID Document{ "@context": "https://w3id.org/did/v1", "id": "did:example:123456789abcdefghi", "publicKey": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "RsaSigningKey2018", "owner": "did:example:123456789abcdefghi", "publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn" }], "authentication": [{ "type": "RsaSignatureAuthentication2018", "publicKey": "did:example:123456789abcdefghi#keys-1" }], "service": [{ "type": "ExampleService", "serviceEndpoint": "https://example.com/endpoint/8377464" }], "created": "2002-10-10T17:00:00Z", "updated": "2016-10-17T02:41:00Z", ”proof": { "type": "RsaSignature2018", "created": "2016-02-08T16:02:20Z", "creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1", ”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0 yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/ gi25s=” } }
  • 25. DID Document – DID{ "@context": "https://w3id.org/did/v1", "id": "did:example:123456789abcdefghi", "publicKey": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "RsaSigningKey2018", "owner": "did:example:123456789abcdefghi", "publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn" }], "authentication": [{ "type": "RsaSignatureAuthentication2018", "publicKey": "did:example:123456789abcdefghi#keys-1" }], "service": [{ "type": "ExampleService", "serviceEndpoint": "https://example.com/endpoint/8377464" }], "created": "2002-10-10T17:00:00Z", "updated": "2016-10-17T02:41:00Z", ”proof": { "type": "RsaSignature2018", "created": "2016-02-08T16:02:20Z", "creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1", ”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0 yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/ gi25s=” } }
  • 26. DID Document – public key{ "@context": "https://w3id.org/did/v1", "id": "did:example:123456789abcdefghi", "publicKey": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "RsaSigningKey2018", "owner": "did:example:123456789abcdefghi", "publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn" }], "authentication": [{ "type": "RsaSignatureAuthentication2018", "publicKey": "did:example:123456789abcdefghi#keys-1" }], "service": [{ "type": "ExampleService", "serviceEndpoint": "https://example.com/endpoint/8377464" }], "created": "2002-10-10T17:00:00Z", "updated": "2016-10-17T02:41:00Z", ”proof": { "type": "RsaSignature2018", "created": "2016-02-08T16:02:20Z", "creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1", ”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0 yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/ gi25s=” } }
  • 27. DID Document – service endpoint{ "@context": "https://w3id.org/did/v1", "id": "did:example:123456789abcdefghi", "publicKey": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "RsaSigningKey2018", "owner": "did:example:123456789abcdefghi", "publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn" }], "authentication": [{ "type": "RsaSignatureAuthentication2018", "publicKey": "did:example:123456789abcdefghi#keys-1" }], "service": [{ "type": "ExampleService", "serviceEndpoint": "https://example.com/endpoint/8377464" }], "created": "2002-10-10T17:00:00Z", "updated": "2016-10-17T02:41:00Z", ”proof": { "type": "RsaSignature2018", "created": "2016-02-08T16:02:20Z", "creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1", ”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0 yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/ gi25s=” } }
  • 28. DID Document – date{ "@context": "https://w3id.org/did/v1", "id": "did:example:123456789abcdefghi", "publicKey": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "RsaSigningKey2018", "owner": "did:example:123456789abcdefghi", "publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn" }], "authentication": [{ "type": "RsaSignatureAuthentication2018", "publicKey": "did:example:123456789abcdefghi#keys-1" }], "service": [{ "type": "ExampleService", "serviceEndpoint": "https://example.com/endpoint/8377464" }], "created": "2002-10-10T17:00:00Z", "updated": "2016-10-17T02:41:00Z", ”proof": { "type": "RsaSignature2018", "created": "2016-02-08T16:02:20Z", "creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1", ”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0 yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/ gi25s=” } }
  • 29. DID Document – proof{ "@context": "https://w3id.org/did/v1", "id": "did:example:123456789abcdefghi", "publicKey": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "RsaSigningKey2018", "owner": "did:example:123456789abcdefghi", "publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----rn" }], "authentication": [{ "type": "RsaSignatureAuthentication2018", "publicKey": "did:example:123456789abcdefghi#keys-1" }], "service": [{ "type": "ExampleService", "serviceEndpoint": "https://example.com/endpoint/8377464" }], "created": "2002-10-10T17:00:00Z", "updated": "2016-10-17T02:41:00Z", ”proof": { "type": "RsaSignature2018", "created": "2016-02-08T16:02:20Z", "creator": "did:sov:8uQhQMGzWxR8vw5P3UWH1j#key/1", ”proofValue": "IOmA4R7TfhkYTYW87z640O3GYFldw0 yqie9Wl1kZ5OBYNAKOwG5uOsPRK8/2C4STOWF+83cMcbZ3CBMq2/ gi25s=” } }
  • 30. DID Methods Active DID Method Specs Method DID Prefix Bitcoin did:btcr Blockstack did:stack Element - Sidetree did:elem Ethereum uPort did:ethr Github DID did:github IPFS did:ipld Sovrin did:soc Veres One did:v1
  • 31. • Syntax • CRUD (Create, Read, Update, Delete) operations • Applies to DIDs and DID documents • Specifies distributed ledger (or blockchain) • Any method-specific elements DID Method Spec Defines
  • 32. • Different use cases • Different capabilities • Different economic model Results in different implementation choices ~25 Different registered DID Methods on a different ledgers • Ethereum, Bitcoin • IPFS • Fit-for-purpose: Sovrin, Veres One • No blockchain: Github DID • Ledger agnostic + scalable: Sidetree (Element, ION) • Thought experiments DID Methods
  • 33. did:btcr:xkyt-fzgq-qq87-xnhn Universal Resolver DID Method Spec DID Document DID Universal Resolver
  • 34. DID Auth Here is my decentralized identifier Prove you own it! Here’s my proof! Come on in! Resolves the DID Document Creates proof
  • 41. GitHub DID BLOCKCHAIN NOT REQUIRED 41 • Development tool for working with DIDs that leverages, github for easy setup without the need to run a ledger. • Supports fast development of DID Verifiable credentials, and new signature suites • Supports a CLI, Web App, API and standard Library Providing useful templates for getting started with DIDs. • Supports OpenPGP Signature Suite, enabling integration with Yubikey, and legacy mail systems that use OpenPGP / GPG. • Interest from GitHub and HyperLedger for use in interoperable documentation. • Supports demo’s for sign, verify, encrypt and decrypt with DIDs. • Supports a standard wallet file, with interoperability with Element and Transmute ID.
  • 42. Interop Project TRANSMUTE LEADS THE 42 • Demonstrate Interoperability across DID Methods, Websites, Agents, Hubs, Identity Wallets and Verifiable Credentials • Provides insight into gaps and opportunities for partnership in the ecosystem. • Transmute is the leader of this initiative, and assists the working groups in providing clarity around interoperability.
  • 44. OUR PROBLEM 44 The Enterprise Identity Crisis describes today’s environment where as companies grow, their risk grows disproportionately.
  • 45. Collaborate Without Compromise Transmute ID integrates with your existing infrastructure, grows with your business and minimizes friction between you and your customers – the fastest path to new revenue. 45 THE SSI-ENABLED ENTERPRISE
  • 46. THE SOLUTION Scalability of Cloud + Security of Decentralized Public Key Cryptography + Automated Tracking on Blockchain 46
  • 47. Enterprise IDP Architecture Transmute Workflow Engine: Open and Closed Source Components Integrations Enterprise Storage Decentralized Infrastructure + Add your own Major enterprise systems like… Major cloud providers like… Leading DLT solutions like… + Add you own + Add your own 47
  • 49. FRAMEWORK FOR ADOPTION 1. Is selective disclosure or privacy a priority? 2. Is there high coordination burden? 3. Is traceability or auditability important? Application Areas Chains of Custody Commercial + Defense Supply Chain Logistics Cold Chain (pharma to agriculture) Contract Management (Legal, HR, Real Estate) Software Data Infrastructure & Governance_ Cloud roles + access management_ Microservices monitoring_ Telco 5G + IoT Enablement Identity/Data-as-a-Service Anti-Fraud (verification + roaming) Healthcare_ Insurance + Billing_ Patient-centric data sharing + management_ 49
  • 50. LOGISTICS APPLICATION Transmute ID combines the security advantages of user- managed access and verified credentials to safely manage identities across your enterprise ecosystem. 50
  • 51. Kantara Initiative PARTNERSHIPS 51 • Transmute engages with the Kantara member network to demonstrate implementations of the mutual Consent Receipt standard, which supports emergent data and privacy regulations like GDPR. • Kantara’s Trust Services Interoperability groups work “at the intersection of digital identity, personal data agency and usability.” CONSENT RECEIPT FLOW EXAMPLE
  • 52. Ledger agnostic protocol for anchoring batches of signed JSON Patch Operations resulting in a DPKI CRDT. Batching supports higher throughput & lower cost, but paranoid users can still anchor themselves. Open Source Apache-2 Implementations for Bitcoin & Ethereum supported by the Linux Foundation. Sidetree Protocol SCALABILITY 52 A javascript library implementing the Sidetree Protocol on Ethereum and IPFS. Modular, portable and extendable with support for both in browser (light client) and full nodes (REST API). Open Source Apache-2, Created by Transmute, supported by Microsoft & the Linux Foundation. Scalable DPKI is the foundation of enterprise security applications. Element S I D E T R E E 52
  • 53. RESOLUTION A kind of reverse anchoring: ledger -> anchor -> batch -> operation => did document Data Poisoning, Spam and Errors: How do trusted nodes handle bad data? Why resolve a DID? Signature Verification, Service Endpoints and the Future of SSI. WALLET Hardware, Mobile, Web, API, Trusted Execution Environment? JWS vs JSON-LD Signatures, the case for JSON-LD. Shamir, Recovery and Usability. Not all keys need to be in the same place!
  • 54. ANCHORING CRUD Signed Operation Batch File Anchor File Signed Ledger Transaction CRUD Signed Operation CRUD Signed Operation Server Client
  • 55. IPFS Ethereum PouchDB NanoBus Storage Blockchain SidetreeLight Node Full Node ServiceBus DB Firestore Mnemonic Key System DID Wallet Protocol Functions Element A R C H I T E C T U R E 55 Server Browser Open Source DID Method in collaboration with DIF Members
  • 57. Vivvo + SSI • eGovernment platform that includes identity federation (SP and IdP), identity proofing, consent and policy management, etc. • Started hearing rumblings about SSI from Government of Canada contacts in 2017 • Started investing in SSI in 2018 from a research perspective • Came to IIW in the fall of 2018 with a pretty early prototype of DID- Auth and collecting verifiable credentials in a wallet
  • 58. SSI Use Case: Vivvo + ISED Business Connect: - In production with the province of Saskatchewan since spring 2018 - Identity, business and relationship to business proofing - Access government services on behalf of a business
  • 59. SSI Use Case: Vivvo + ISED
  • 60. SSI Use Case: Vivvo + ISED
  • 61. SSI Use Case: Vivvo + ISED
  • 62. SSI Use Case: Vivvo + ISED
  • 63. Vivvo: What has worked well? “I love the idea of authentication with my phone for all government services not only for businesses.” “I liked how the phone app notified me quickly about creating the credentials in my digital wallet –it was almost instantaneous.” “What I liked about the functionality tested - no remembering of usernames and passcodes, information reusable with my consent, the digital wallet concept.”
  • 64. Vivvo: Industry Response • Use of verified identity information on mobile device (i.e. digital wallet) is a key enabler to easy and secure sharing of business identity among service providers • Need for common / standard technology platform to enable re-use of verified identity information across digital identity providers and applications. • Need for education and paradigm shift to increase trust/confidence for using mobile device for higher risk transactions. • Perception that mobile device technology is not mature enough (at least in North America) for digital wallet/payme
  • 65. Vivvo: Outstanding Challenges • did:vvo method backed by rest service / relational database • Our PoC with ISED was more about passwordless auth and portability of VCs than proving out a DID method and/or DLT • We are betting big time on interoperability and standardization
  • 67.
  • 68. Many Proof of Concepts Proof of Concept Use Case Who’s Involved VON Business Credentials British Columbia Government CU Ledger Credit Union Banking Security Sovrin + Credit Union National Association Building Blocks Food Aid World Food Programme (Syrian Refugee Aid) Dutch Digital ID Digital ID TU Delft + Dutch Gov + Others Walmart Supply Chain Food Supply Tracking Walmart + Hyperledger Fabric TradeLens Shipping Shipping + Tracking IBM + Maersk
  • 69. Novartis Pharmaceuticals • Innovative Medicine Initiative Blockchain Enabled Healthcare • Experimenting with DIDs & Verifiable Credentials since 2016 • Third party risk – Qualified suppliers: environmental & labor practices + auditing – IoT: temperature monitoring for data integrity – Digitized documents: materials certifications, trade documents • Sharing patient data – Drug trials – Patient experience w/ doctors, researchers, and companies
  • 70. Government Support • DHS SBIR & SVIP Grants – Improve Supply Chain Management – Combat Counterfeit Goods • Canadian Government Innovation Challenge: – https://www.ic.gc.ca/eic/site/101.nsf/eng/00068.html Source: DHS Science and Technology Directorate's Testimony before the US House of Representatives, May 8, 2018
  • 71. DIF
  • 72. SSI improves user experience • Assert an identity or credential digitally – Could be verified or not • User collects, shares, controls their own data – Fine toothed control, read, save, edit the data – Share verified data anonymously • Increases privacy, while enabling data sharing
  • 73. SSI improves Business & Government • Potential to reduce/eliminate database security risk • More control over credentials issued, revocation • Streamline onboarding, increase business efficiency – Reduce fraud by confirming multiple data points – Streamline confirmation of compliance data/documentation • Increase trust of any verified data that must be shared downstream – Drug trials – Compliance documents – Provenance data
  • 74. In conclusion • Users control their identities & data • Emerging technology for IoT identity • Business opportunities for digitally native credentials • Opportunity to build interoperable infrastructure • Many companies, governments & communities are building & investing in it today
  • 75. Resources Guide to SSI: https://ssiscoop.com/ W3C Credentials Community Group https://w3c-ccg.github.io/ W3C DID WG: https://www.w3.org/2019/did-wg/ DIF: http://identity.foundation/ IIW: https://www.internetidentityworkshop.com SSI Meetup: http://ssimeetup.org RWOT: https://www.weboftrust.info/
  • 76. INTERNET IDENTITY WORKSHOP | October 2019 Heather Vescent, Karyl Fowler, & Lucas Tétreault SSI 101