SlideShare a Scribd company logo
Own And ControlYour Identity: Identity
Management Using Blockchain
Mohan Venkataraman – CTO, Chainyard
Jake Gostylo – Director, Content Innovation, D&B | October 2019
2
Let’s look at the world today…
Own and Control Your Identity
The start to fighting all the business losses in fraud is
advances in identity and identity management
Fraud in the US is a $600B a year drain on business.
https://www.bizjournals.com/nashville/stories/2007/10/15/focus4.html
Globally, fake goods is a $500B a year problem.
https://www.oecd.org/newsroom/trade-in-fake-goods-is-now-33-of-world-trade-and-rising.htm
3
By way of introduction
Own and Control Your Identity
Jake Gostylo – Director of Data Innovation
Dun & Bradstreet: The global leader in commercial data offering
insights on over 330M entities globally through the Dun & Bradstreet
Data Cloud and solutions it powers.
MohanVenkataraman – CTO of Chainyard
In partnership with IBM and over 10 major brands we are launching
the TrustYour Supplier (TYS) network for supply chain onboarding.
AGENDA
• TheTYS Network
• Self-Sovereign Identities
• Decentralized ID
• Why Blockchain
• What is an attestation
• Why Dun & Bradstreet is interested in the business of
attestations
• How will business interactions improve
• What does this mean for IoT
• How does this scale for IoT applications
5Copyright © 2018 CHAINYARD™️
Create a
Trusted Source of Supplier
Information and Digital
Identity
O B J E C T I V E
Supplier Onboarding and Lifecycle Management
that simplifies and accelerates
Reduce
Cost
Mitigate
Risk
Shorten Cycle
Time
Create
TrustA Single SSI based Supplier Digital Passport
6
What is Identity?
–Identity is a set of characteristics that an entity (Person, Organization orThing)
identifies as belonging uniquely to them embodying both changeable and unchangeable
traits obtained naturally or provided by external bodies.
▪ Traditionally multiple identifiers issued by multiple bodies, centrally controlled, and can be
restricted or revoked by the identity issuer at will
–Self-sovereign identity, can be defined as a lifetime portable digital identity that does not
depend on any centralized authority.
▪ Its a new class of identifier that fulfills all four requirements: persistence, global resolvability,
cryptographic verifiability, and decentralization
Copyright ©
2018 CHAINYARD©
7
Why SSI?
–Enables a person, corporation or a thing to determine what constitutes their identity
–Securely share portions or in-full with one or more parties, claims made about their identity
in a verifiable manner
–Carry identity across geographic, business and economic boundaries
–Self manage claims and reputation by identity holder
–Enables issuers of verifiable claims to revoke or update the claims as information
surrounding them changes
Copyright ©
2018 CHAINYARD©
Leverages Decentralized PKI, Decentralized Identity and the Blockchain
8
TheTYS Decentralized Identifier (DID)
Copyright ©
2018 CHAINYARD©
DID with Base58 or Base64 Encoding
did:tys:<left 20 bytes(sha256_hash(did_public_key)
did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd
Scheme
Namespace
Namespace Specific
Identifier
DID Document
Globally Unique Identifier that resolves to DID Document
9
Digital Identities in TYS
–DID : Digital Identity representing an Individual, Organization or Thing
–Pairwise DID : Digital Identity associated with a Relationship, and resolves to a private DDOC
document; (can be public) stored on sideDB or a private channel
Own and Control Your Identity
Supplier
(Holder)
Trust Anchor
(Verifier)
Supplier DID: did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd
Insurer
(Issuer)
Relationship : did:tys:2CedfxABpz7MHEKBwbadFFd6aBc
Points to a private DID Documentissues
Insurance
Certificate
attests
Buyer
(Relying Party)
trusts
10
DIDs and Blockchain (TYS)
Own and Control Your Identity
Digital credential
Credential Provider
(Issuer)
Supplier
(Holder)
Issue
Receive Present
validate
Verify
(Verifier)
Buyer
(Relying Party)
DID API (create, update, revoke query) & Resolver API
Permissioned
Ledger Uploadpre
issuedcredential
http://www.tys.com/credentials/1490
11
Trust Your Supplier – Why Blockchain
Conventional Systems are open to error,fraud and inefficiency
• In conventional systems each participant has his own, separate database, or
ledger — increasing the possibility of human error or fraud
• Shared databases cannot prevent malicious activity. Hacked entities can corrupt
or destroy data in the shared database, making it invalid for everyone involved.
• Reliance on intermediaries for validation creates inefficiencies
• Often laden with manual processes, resulting in frequent delays and inefficiencies
Blockchain is designed for trust and secure trading
• Single, shared, tamper-evident ledger — once recorded, transactions cannot be altered
• Provides levels of error checking and transaction validity not obtainable in regular
shared databases.
• Data is guaranteed to be valid and reconciled against the data held by the others
participating on the Blockchain.
• Immutably records all details of a transaction end-to-end, reducing vulnerabilities.
Blockchain Provides a Trusted, Common, Single Version of the Truth
12
Historical Milestones for attestations
Own and Control Your Identity
1977 – The first algorithms published that provide provable
digital signature produced from a private key.
1988 – Commercially viable attestations of one cryptographic
artifact to another. Strict authority hierarchy.
1992 – Web of Trust introduced with PGP as a distributed way
to manage attestations. Graph techniques used to judge validity.
RSA
x.509
WoT
13
What is an attestation?
Own and Control Your Identity
{
@context: “https://schema.org
id: “did:tys:1234567890”,
name: “Gorman Manufacturing”,
sig: “8e1736ac625…”
}
Cryptographic Artifact Subject DID
Third Party DID
{
name:“Gorman Manufacturing”
}
Data
14
Where do attestations belong?
Own and Control Your Identity
Attestations should not be
pushed to a blockchain, not
even encrypted.
Blockchain
Hash(data + nonce)
Offchain Datastore
Encrypt(data)
15
Why does Dun & Bradstreet care about this?
Own and Control Your Identity
CHANGINGTHE PARADIGM
• Much more transparency in the process. No longer is the buyer is getting data
that the seller knows nothing about.
• Follows the strictest intent of General Data Protection Regulation (GDPR).
• Closer interaction with the entity we have data on will allow positive feedback
loop for increased data quality.
16
How will businesses benefit?
Own and Control Your Identity
RFP process can have the
vetting frontloaded. No
more going back to the
drawing board.
Suppliers have greater
transparency in how they
are presented.
The bottom line is that all parties get reliable data faster.
Suppliers don’t have to fill
out different questionnaires
for every engagement.
The number of necessary
touch points with third party
data decreases.
17
What does Identity look like in an IoT business context
IIC Presentation (Confidential)
Device
OwnerIdentity
Beneficial Owner
IoT Device
Reputation
Transaction on behalf of ownership
18
IoT, Identity and Blockchains
–IoTs play a critical role in enabling efficient, fraud and counterfeit proof, auditable supply chains
–Authenticating and authorization of IoT devices through digital identities is a critical aspect of
preventing intrusion and hacking of business processes
–IoT devices provide verifiable credentials and attest supply chain transactions
–IoT Devices can be applied for various purposes such as location capture, imaging, motion
detection, altitude, tilt, light exposure, route deviations, acceleration
–Smart Tags such as RFID, NFC Chips, Chemical and Optical Tags provide verifiable credentials
to products
–DIDs provide credentials to parties and/or assets in the supply chain such as product, suppliers,
transporters and logistics operators
–Combined with Digital Identities and Smart Tagging Technologies, IoT and Blockchain provide
higher levels of trust in ensuring supplier credibility and product authenticity
Own and Control Your Identity
19
IOT Landscape
Own and Control Your Identity
20
Supply Chain – From Seller to Buyer
Copyright ©
2018 CHAINYARD©
Logistics
This Photo(s) by Unknown Author is licensed
under CC BY
Company (Corp) Buyer (Corp.)
Buyer (Retail Store)FactorySupplier
Sales Order, Payment
ASN, Invoice
Fulfillment
Order
Supplier PO
Order
Delivery
Order
Transport
WH DC
Goods
Receipt
PoD 214
Consumer
Fraud can occur at any point within the Supply Chain
21
The Future ofVerifiable Credentials
IoT and Blockchain In Supply Chain
Own and Control Your Identity
Blockchain Assigns
DID
Manufacturer
Assigns Smart Tag
Maps to Product Code/Serial#
Retailer
Issues Proof of Cryptographically
Verifiable Proof-of-Purchase Cert.
Tokenization
Assigns Cryptographic ERC-20
Proof of Ownership Token
IoT Devices
Records Proof of Supply Chain
Process
F682BC0EF6CF00D777C2EA7AEFDD9B548A892
91728FD2C349D6A5E83BD77A85B
22
A Conceptual Architecture
Own and Control Your Identity
23
ThankYou

More Related Content

PPTX
Fintech & blockchain technology 06.12.2021
Oluwaseyi Adeniyan
 
PDF
Get Rich with Blockchain & Cryptocurrency
keerthi678722
 
PPTX
What is tokenization in blockchain?
Ulf Mattsson
 
PPTX
Blockchain use cases in 2022 real world industry applications
ArpitGautam20
 
PDF
blockchain governance : opportunities and challenges
Rachid Meziani, PhD, CGEIT, PMP
 
PDF
Hyperledger development &amp; smart contract development
gavraskaranand
 
PDF
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Floyd DCosta
 
PPTX
Decentralized disruption
Antti Kettunen
 
Fintech & blockchain technology 06.12.2021
Oluwaseyi Adeniyan
 
Get Rich with Blockchain & Cryptocurrency
keerthi678722
 
What is tokenization in blockchain?
Ulf Mattsson
 
Blockchain use cases in 2022 real world industry applications
ArpitGautam20
 
blockchain governance : opportunities and challenges
Rachid Meziani, PhD, CGEIT, PMP
 
Hyperledger development &amp; smart contract development
gavraskaranand
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Floyd DCosta
 
Decentralized disruption
Antti Kettunen
 

What's hot (20)

PDF
DCG Bitcoin and Blockchain Tech Summit - Opening Remarks
Digital Currency Group
 
PPTX
8 Decimal Capital Enterprise Solution Overview
Remi Gai
 
PDF
DeFi Beyond the Hype
Harsha MV
 
PPTX
Blockchain FinTech App | Land Registry
Bahaa Farouk
 
PDF
Metamorphosing Indian Blockchain Ecosystem
Dr. Amarjeet Singh
 
PPTX
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain
Roger Royse
 
PPTX
What is Blockchain and How Can It Change the Game for Financial Institutions?
Colleen Beck-Domanico
 
PDF
Cryptocurrency products from hashCash
HashCash Consultants
 
PDF
Blockchain FinTech PoC
Sanjeev Raman
 
PDF
Introduction to Self-Sovereign Identity
Karyl Fowler
 
PPTX
Blockchain Technology: Adoption Challenges, Platform and Applications
Sanjeev Verma, PhD
 
PDF
How BlockChain Technology Will Transform The Publishing Industry
PromptCloud
 
PDF
Aurigraph Distributed Ledger Technology
Subbu Jois
 
PDF
Blockchain: the trust fabric for next generation digital identity management
EY
 
PPTX
ISTA 2017 - Blockchain, beyond Bitcoin
Vladimir Savchenko
 
PPTX
Blockchain and Applications in Islamic Finance
Rizal Mohd Nor
 
PPTX
Token Governance in Blockchain Ecosystems
Dr. Nikolaus Lipusch
 
PDF
How blockchain is changing finance
EY
 
PDF
Blockchain & microsoft
İbrahim KIVANÇ
 
PDF
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Heather Vescent
 
DCG Bitcoin and Blockchain Tech Summit - Opening Remarks
Digital Currency Group
 
8 Decimal Capital Enterprise Solution Overview
Remi Gai
 
DeFi Beyond the Hype
Harsha MV
 
Blockchain FinTech App | Land Registry
Bahaa Farouk
 
Metamorphosing Indian Blockchain Ecosystem
Dr. Amarjeet Singh
 
Week 5 - Blockchain Economics: Strategic Value in Private Blockchain
Roger Royse
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
Colleen Beck-Domanico
 
Cryptocurrency products from hashCash
HashCash Consultants
 
Blockchain FinTech PoC
Sanjeev Raman
 
Introduction to Self-Sovereign Identity
Karyl Fowler
 
Blockchain Technology: Adoption Challenges, Platform and Applications
Sanjeev Verma, PhD
 
How BlockChain Technology Will Transform The Publishing Industry
PromptCloud
 
Aurigraph Distributed Ledger Technology
Subbu Jois
 
Blockchain: the trust fabric for next generation digital identity management
EY
 
ISTA 2017 - Blockchain, beyond Bitcoin
Vladimir Savchenko
 
Blockchain and Applications in Islamic Finance
Rizal Mohd Nor
 
Token Governance in Blockchain Ecosystems
Dr. Nikolaus Lipusch
 
How blockchain is changing finance
EY
 
Blockchain & microsoft
İbrahim KIVANÇ
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Heather Vescent
 
Ad

Similar to Barcelona presentationv6 (20)

PDF
What is self-sovereign identity (SSI)?
Evernym
 
PDF
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
PDF
Digital Identity, Not Digitised Identity
David Birch
 
PDF
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
LFDT Tokyo Meetup
 
PDF
David shrier, weige wu, alex pentland mit blockchain
IT Strategy Group
 
PDF
so-what-jun22.pdf
Innovative Identity Solutions Ltd
 
PDF
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
JamieDornan2
 
PDF
Blockchain in Identity Management - An Overview.pdf
JamieDornan2
 
PDF
Identity & trust in Monitored Spaces
Eleanor McHugh
 
PPTX
Jan Keil - Identity and access management Facts. Challenges. Solution
Timetogrowup
 
PDF
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
PPTX
CRUD chains
David Birch
 
PDF
Blockchains Impact on Identity Management.pdf
matthew09cyrus
 
PDF
How Blockchain Revolutionizes Digital Identity.pdf
Ravi Asnani
 
PPTX
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
bernardgolden
 
PPTX
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
PDF
Blockchains Impact on Identity Management.pdf
niahiggins21
 
PPTX
Blockchain Possibilities: Identity, Privacy, and Advertising
Inês Almeida
 
PDF
Why Blockchain is the Future of Secure Identity Management.pdf
Global Market Studies
 
PDF
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
What is self-sovereign identity (SSI)?
Evernym
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
Digital Identity, Not Digitised Identity
David Birch
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
LFDT Tokyo Meetup
 
David shrier, weige wu, alex pentland mit blockchain
IT Strategy Group
 
How Does Blockchain Identity Management Revolutionise Financial Sectors.pdf
JamieDornan2
 
Blockchain in Identity Management - An Overview.pdf
JamieDornan2
 
Identity & trust in Monitored Spaces
Eleanor McHugh
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Timetogrowup
 
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
CRUD chains
David Birch
 
Blockchains Impact on Identity Management.pdf
matthew09cyrus
 
How Blockchain Revolutionizes Digital Identity.pdf
Ravi Asnani
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
bernardgolden
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
Blockchains Impact on Identity Management.pdf
niahiggins21
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Inês Almeida
 
Why Blockchain is the Future of Secure Identity Management.pdf
Global Market Studies
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
The Future of Artificial Intelligence (AI)
Mukul
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Software Development Methodologies in 2025
KodekX
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 

Barcelona presentationv6

  • 1. Own And ControlYour Identity: Identity Management Using Blockchain Mohan Venkataraman – CTO, Chainyard Jake Gostylo – Director, Content Innovation, D&B | October 2019
  • 2. 2 Let’s look at the world today… Own and Control Your Identity The start to fighting all the business losses in fraud is advances in identity and identity management Fraud in the US is a $600B a year drain on business. https://www.bizjournals.com/nashville/stories/2007/10/15/focus4.html Globally, fake goods is a $500B a year problem. https://www.oecd.org/newsroom/trade-in-fake-goods-is-now-33-of-world-trade-and-rising.htm
  • 3. 3 By way of introduction Own and Control Your Identity Jake Gostylo – Director of Data Innovation Dun & Bradstreet: The global leader in commercial data offering insights on over 330M entities globally through the Dun & Bradstreet Data Cloud and solutions it powers. MohanVenkataraman – CTO of Chainyard In partnership with IBM and over 10 major brands we are launching the TrustYour Supplier (TYS) network for supply chain onboarding.
  • 4. AGENDA • TheTYS Network • Self-Sovereign Identities • Decentralized ID • Why Blockchain • What is an attestation • Why Dun & Bradstreet is interested in the business of attestations • How will business interactions improve • What does this mean for IoT • How does this scale for IoT applications
  • 5. 5Copyright © 2018 CHAINYARD™️ Create a Trusted Source of Supplier Information and Digital Identity O B J E C T I V E Supplier Onboarding and Lifecycle Management that simplifies and accelerates Reduce Cost Mitigate Risk Shorten Cycle Time Create TrustA Single SSI based Supplier Digital Passport
  • 6. 6 What is Identity? –Identity is a set of characteristics that an entity (Person, Organization orThing) identifies as belonging uniquely to them embodying both changeable and unchangeable traits obtained naturally or provided by external bodies. ▪ Traditionally multiple identifiers issued by multiple bodies, centrally controlled, and can be restricted or revoked by the identity issuer at will –Self-sovereign identity, can be defined as a lifetime portable digital identity that does not depend on any centralized authority. ▪ Its a new class of identifier that fulfills all four requirements: persistence, global resolvability, cryptographic verifiability, and decentralization Copyright © 2018 CHAINYARD©
  • 7. 7 Why SSI? –Enables a person, corporation or a thing to determine what constitutes their identity –Securely share portions or in-full with one or more parties, claims made about their identity in a verifiable manner –Carry identity across geographic, business and economic boundaries –Self manage claims and reputation by identity holder –Enables issuers of verifiable claims to revoke or update the claims as information surrounding them changes Copyright © 2018 CHAINYARD© Leverages Decentralized PKI, Decentralized Identity and the Blockchain
  • 8. 8 TheTYS Decentralized Identifier (DID) Copyright © 2018 CHAINYARD© DID with Base58 or Base64 Encoding did:tys:<left 20 bytes(sha256_hash(did_public_key) did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd Scheme Namespace Namespace Specific Identifier DID Document Globally Unique Identifier that resolves to DID Document
  • 9. 9 Digital Identities in TYS –DID : Digital Identity representing an Individual, Organization or Thing –Pairwise DID : Digital Identity associated with a Relationship, and resolves to a private DDOC document; (can be public) stored on sideDB or a private channel Own and Control Your Identity Supplier (Holder) Trust Anchor (Verifier) Supplier DID: did:tys:2XhdfxCGMpz7MHEKBwbadCZd6aBd Insurer (Issuer) Relationship : did:tys:2CedfxABpz7MHEKBwbadFFd6aBc Points to a private DID Documentissues Insurance Certificate attests Buyer (Relying Party) trusts
  • 10. 10 DIDs and Blockchain (TYS) Own and Control Your Identity Digital credential Credential Provider (Issuer) Supplier (Holder) Issue Receive Present validate Verify (Verifier) Buyer (Relying Party) DID API (create, update, revoke query) & Resolver API Permissioned Ledger Uploadpre issuedcredential http://www.tys.com/credentials/1490
  • 11. 11 Trust Your Supplier – Why Blockchain Conventional Systems are open to error,fraud and inefficiency • In conventional systems each participant has his own, separate database, or ledger — increasing the possibility of human error or fraud • Shared databases cannot prevent malicious activity. Hacked entities can corrupt or destroy data in the shared database, making it invalid for everyone involved. • Reliance on intermediaries for validation creates inefficiencies • Often laden with manual processes, resulting in frequent delays and inefficiencies Blockchain is designed for trust and secure trading • Single, shared, tamper-evident ledger — once recorded, transactions cannot be altered • Provides levels of error checking and transaction validity not obtainable in regular shared databases. • Data is guaranteed to be valid and reconciled against the data held by the others participating on the Blockchain. • Immutably records all details of a transaction end-to-end, reducing vulnerabilities. Blockchain Provides a Trusted, Common, Single Version of the Truth
  • 12. 12 Historical Milestones for attestations Own and Control Your Identity 1977 – The first algorithms published that provide provable digital signature produced from a private key. 1988 – Commercially viable attestations of one cryptographic artifact to another. Strict authority hierarchy. 1992 – Web of Trust introduced with PGP as a distributed way to manage attestations. Graph techniques used to judge validity. RSA x.509 WoT
  • 13. 13 What is an attestation? Own and Control Your Identity { @context: “https://schema.org id: “did:tys:1234567890”, name: “Gorman Manufacturing”, sig: “8e1736ac625…” } Cryptographic Artifact Subject DID Third Party DID { name:“Gorman Manufacturing” } Data
  • 14. 14 Where do attestations belong? Own and Control Your Identity Attestations should not be pushed to a blockchain, not even encrypted. Blockchain Hash(data + nonce) Offchain Datastore Encrypt(data)
  • 15. 15 Why does Dun & Bradstreet care about this? Own and Control Your Identity CHANGINGTHE PARADIGM • Much more transparency in the process. No longer is the buyer is getting data that the seller knows nothing about. • Follows the strictest intent of General Data Protection Regulation (GDPR). • Closer interaction with the entity we have data on will allow positive feedback loop for increased data quality.
  • 16. 16 How will businesses benefit? Own and Control Your Identity RFP process can have the vetting frontloaded. No more going back to the drawing board. Suppliers have greater transparency in how they are presented. The bottom line is that all parties get reliable data faster. Suppliers don’t have to fill out different questionnaires for every engagement. The number of necessary touch points with third party data decreases.
  • 17. 17 What does Identity look like in an IoT business context IIC Presentation (Confidential) Device OwnerIdentity Beneficial Owner IoT Device Reputation Transaction on behalf of ownership
  • 18. 18 IoT, Identity and Blockchains –IoTs play a critical role in enabling efficient, fraud and counterfeit proof, auditable supply chains –Authenticating and authorization of IoT devices through digital identities is a critical aspect of preventing intrusion and hacking of business processes –IoT devices provide verifiable credentials and attest supply chain transactions –IoT Devices can be applied for various purposes such as location capture, imaging, motion detection, altitude, tilt, light exposure, route deviations, acceleration –Smart Tags such as RFID, NFC Chips, Chemical and Optical Tags provide verifiable credentials to products –DIDs provide credentials to parties and/or assets in the supply chain such as product, suppliers, transporters and logistics operators –Combined with Digital Identities and Smart Tagging Technologies, IoT and Blockchain provide higher levels of trust in ensuring supplier credibility and product authenticity Own and Control Your Identity
  • 19. 19 IOT Landscape Own and Control Your Identity
  • 20. 20 Supply Chain – From Seller to Buyer Copyright © 2018 CHAINYARD© Logistics This Photo(s) by Unknown Author is licensed under CC BY Company (Corp) Buyer (Corp.) Buyer (Retail Store)FactorySupplier Sales Order, Payment ASN, Invoice Fulfillment Order Supplier PO Order Delivery Order Transport WH DC Goods Receipt PoD 214 Consumer Fraud can occur at any point within the Supply Chain
  • 21. 21 The Future ofVerifiable Credentials IoT and Blockchain In Supply Chain Own and Control Your Identity Blockchain Assigns DID Manufacturer Assigns Smart Tag Maps to Product Code/Serial# Retailer Issues Proof of Cryptographically Verifiable Proof-of-Purchase Cert. Tokenization Assigns Cryptographic ERC-20 Proof of Ownership Token IoT Devices Records Proof of Supply Chain Process F682BC0EF6CF00D777C2EA7AEFDD9B548A892 91728FD2C349D6A5E83BD77A85B
  • 22. 22 A Conceptual Architecture Own and Control Your Identity