Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.
Understanding SSI
Kaliya Young
InDITA July 11, 2018
What is a Blockchain?
The first blockchain was
The first blockchain was
the Bitcoin blockchain
The first blockchain was
the Bitcoin blockchain
How does it work?
The first blockchain was
the Bitcoin blockchain
How does it work?
we will get to that
Why is it Interesting?
Why is it Interesting?
Solves the
Double Spend Problem
What is a BitCoin?
BitCoin
Number
What is a BitCoin?
BitCoin
Address 1
BitCoin
Number
BitCoin
Address 1
BitCoin
Number
WALLET for
BITCOIN ADDRESS
PRIVATE Key
of BitCoin Address 1
BitCoin
Address 1 SENDS
WALLET for
BITCOIN ADDRESS
PRIVATE Key
of BitCoin Address 1
BitCoin
Number
BitCoin
Address 1
BitCoin
NumberSENDS TO
BitCoin
Address 1
BitCoin
NumberSENDS
BitCoin
Address 2TO
BitCoin
Address 1
BitCoin
NumberSENDS
BitCoin
Address 2TO
THIS IS A TRANSACTION
BitCoin
Address 3 SENDS
WALLET for
BITCOIN ADDRESS
PRIVATE Key
of BitCoin Address 1
BitCoin
Number
BitCoin
Address 3
BitCoin
NumberSENDS
BitCoin
Address 3
BitCoin
NumberSENDS
BitCoin
Address 5TO
BitCoin
Address 3
BitCoin
NumberSENDS
BitCoin
Address 4TO
THIS IS A TRANSACTION
THIS IS A TRANSACTION
THIS IS A TRANSACTION
About Ten Minutes
??????
<—— What is the HASH (Special Number)
of the Bundle of Transactions
<——- The Special is Found by a Miner Node
and they are rewarded with a
totally New Bitcoin Number
??????
??????
??????
???
….
This LEDGER of Transactions
This LEDGER of Transactions
this is CHAIN of BLOCKS of Transaction
This LEDGER of Transactions
this is CHAIN of BLOCKS of Transaction
This is all maintained by a network of
commuters a, DIS...
This LEDGER of Transactions
One SHARED LEDGER of Transactions
this is CHAIN of BLOCKS of Transaction
This is all maintaine...
….
WHAT IS SPECIAL ABOUT THIS?
It is Immutable
It is Immutable
You can’t erase
transactions.
Its Transparent
Its Transparent
Anyone can
see the transactions
Its “Trustless”
Its “Trustless”
The software of the network
runs it. NOT a central
institutional authority.
What really makes it work?
What really makes it work?
Protocol
RENT-A
RENT-A
MYURL.COM
RENT-A
MYURL.COM
#
Decentralized IDentifier - DID
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Method
Scheme
Method-Specific Identifier
Decentralized IDentifier - DID
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Method
Scheme
Method-Specific Identifier
Slide credit: Dr...
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Slide credit: Drummond Reed, Sovrin Foundation
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
Public
Key
cc2cd0ffde594d278c2d9b432f4748506a7f9f2
5141e485eb84bc188382019b6
Slide cred...
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
047d599d4521480d9e1919481b024f29d2693f2
72d19473dbef971d7d529f6e9
Private

Key
Public
K...
did:sov:3k9dg356wdcj5gf2k9bw8kfg7a
047d599d4521480d9e1919481b024f29d2693f2
72d19473dbef971d7d529f6e9
Private

Key
Public
K...
{ “Key”: “Value” }
DID
Decentralized
Identifier
DID Document
JSON-LD document
describing the
entity identified by
the DID
...
1. DID (for self-description)
2. Set of public keys (for verification)
3. Set of auth protocols (for authentication)
4. Se...
1. DID (for self-description)
2. Set of public keys (for verification)
3. Set of auth protocols (for authentication)
4. Se...
1. DID (for self-description)
2. Set of public keys (for verification)
3. Set of auth protocols (for authentication)
4. Se...
1. DID (for self-description)
2. Set of public keys (for verification)
3. Set of auth protocols (for authentication)
4. Se...
1. DID (for self-description)
2. Set of public keys (for verification)
3. Set of auth protocols (for authentication)
4. Se...
Institutions can Issue
Verified (Digital) Credentials
to Organizations
Verifiable Organizations Network
British Columbia Government
is building it,
and its all up on GitHub
Verifiable Organizations Network
Verifiable Organizations Network
Verifiable Organizations Network
OrgBookProfile
a Business
Public Business Permits
Verifiable Organizations Network
OrgBookProfile
a Business
Business Owner
Can Claim These
Public Business Permits
Verifiable Organizations Network
OrgBookProfile
a Business
Business Owner
Can Claim These
In the Verifiable
Credentials Forma...
Verifiable Organizations Network
OrgBookProfile
a Business
Business Owner
Can Claim These
In the Verifiable
Credentials Forma...
Verifiable Organizations Network
HolderIssuer Verifier
Issues 

Claim
Decentralized Identifiers (DIDs)
Public Blockchain or...
Verifiable Organizations Network
HolderIssuer Verifier
Issues 

Claim
Decentralized Identifiers (DIDs)
Public Blockchain or...
Verifiable Organizations Network
HolderIssuer Verifier
Issues 

Claim
Presents

Claim
Decentralized Identifiers (DIDs)
Publ...
HOW DO YOU KNOW ITS TRUE?
Without…
HOW DO YOU KNOW ITS TRUE?
Without…
HOW DO YOU KNOW ITS TRUE?
Without…
!109
Create Addressable Identifiers
Created and Owned by People
Self Sovereign Identity
no facebook
no phone number
no email provider
NO PERSONALLY IDENTIFIABLE
INFORMATION
ENDS UP ON THE BLOCK CHAIN
Shared Ledgers
Different Blockchain Flavors
Bitcoin,

Ethereum, IOTA,

Veres One
Permissionless Permissioned
Public
Private
Validation
Ac...
DID Layer
The decentralized identity “stack”
Cloud Layer
Cloud Wallet Cloud Wallet
Cloud Agent Cloud Agent
Identity Owners...
HOW DO YOU KNOW ITS TRUE?
Without…
HOW DO YOU KNOW ITS TRUE?
Without…
HOW DO YOU KNOW ITS TRUE?
Without…
It is essential that we change the culture around
how technology is built now:
• to put humanness first,
• to center commun...
Kaliya Young
kaliya@IdentityWoman.net
Get the Self-Sovereign Identity Scoop
SSIScoop.com
HumanFirst.Tech
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
Próxima SlideShare
Cargando en…5
×

InDITA - Understanding Self-Sovereign Identity

135 visualizaciones

Publicado el

This is a deck that for describing Self-Sovereign Identity. It was presented at InDITA. It covers Distributed Ledgers (Blockchains), Verifiable Claims, Decentralized Identifiers.

Publicado en: Tecnología
  • Sé el primero en comentar

  • Sé el primero en recomendar esto

InDITA - Understanding Self-Sovereign Identity

  1. 1. Understanding SSI Kaliya Young InDITA July 11, 2018
  2. 2. What is a Blockchain?
  3. 3. The first blockchain was
  4. 4. The first blockchain was the Bitcoin blockchain
  5. 5. The first blockchain was the Bitcoin blockchain How does it work?
  6. 6. The first blockchain was the Bitcoin blockchain How does it work? we will get to that
  7. 7. Why is it Interesting?
  8. 8. Why is it Interesting? Solves the Double Spend Problem
  9. 9. What is a BitCoin?
  10. 10. BitCoin Number What is a BitCoin?
  11. 11. BitCoin Address 1 BitCoin Number
  12. 12. BitCoin Address 1 BitCoin Number WALLET for BITCOIN ADDRESS PRIVATE Key of BitCoin Address 1
  13. 13. BitCoin Address 1 SENDS WALLET for BITCOIN ADDRESS PRIVATE Key of BitCoin Address 1 BitCoin Number
  14. 14. BitCoin Address 1 BitCoin NumberSENDS TO
  15. 15. BitCoin Address 1 BitCoin NumberSENDS BitCoin Address 2TO
  16. 16. BitCoin Address 1 BitCoin NumberSENDS BitCoin Address 2TO THIS IS A TRANSACTION
  17. 17. BitCoin Address 3 SENDS WALLET for BITCOIN ADDRESS PRIVATE Key of BitCoin Address 1 BitCoin Number
  18. 18. BitCoin Address 3 BitCoin NumberSENDS
  19. 19. BitCoin Address 3 BitCoin NumberSENDS BitCoin Address 5TO
  20. 20. BitCoin Address 3 BitCoin NumberSENDS BitCoin Address 4TO THIS IS A TRANSACTION
  21. 21. THIS IS A TRANSACTION
  22. 22. THIS IS A TRANSACTION
  23. 23. About Ten Minutes
  24. 24. ?????? <—— What is the HASH (Special Number) of the Bundle of Transactions
  25. 25. <——- The Special is Found by a Miner Node and they are rewarded with a totally New Bitcoin Number
  26. 26. ??????
  27. 27. ??????
  28. 28. ??????
  29. 29. ???
  30. 30. ….
  31. 31. This LEDGER of Transactions
  32. 32. This LEDGER of Transactions this is CHAIN of BLOCKS of Transaction
  33. 33. This LEDGER of Transactions this is CHAIN of BLOCKS of Transaction This is all maintained by a network of commuters a, DISTRIBUTED LEDGER
  34. 34. This LEDGER of Transactions One SHARED LEDGER of Transactions this is CHAIN of BLOCKS of Transaction This is all maintained by a network of commuters a, DISTRIBUTED LEDGER
  35. 35. …. WHAT IS SPECIAL ABOUT THIS?
  36. 36. It is Immutable
  37. 37. It is Immutable You can’t erase transactions.
  38. 38. Its Transparent
  39. 39. Its Transparent Anyone can see the transactions
  40. 40. Its “Trustless”
  41. 41. Its “Trustless” The software of the network runs it. NOT a central institutional authority.
  42. 42. What really makes it work?
  43. 43. What really makes it work? Protocol
  44. 44. RENT-A
  45. 45. RENT-A MYURL.COM
  46. 46. RENT-A MYURL.COM #
  47. 47. Decentralized IDentifier - DID did:sov:3k9dg356wdcj5gf2k9bw8kfg7a Method Scheme Method-Specific Identifier
  48. 48. Decentralized IDentifier - DID did:sov:3k9dg356wdcj5gf2k9bw8kfg7a Method Scheme Method-Specific Identifier Slide credit: Drummond Reed, Sovrin Foundation
  49. 49. did:sov:3k9dg356wdcj5gf2k9bw8kfg7a Slide credit: Drummond Reed, Sovrin Foundation
  50. 50. did:sov:3k9dg356wdcj5gf2k9bw8kfg7a Public Key cc2cd0ffde594d278c2d9b432f4748506a7f9f2 5141e485eb84bc188382019b6 Slide credit: Drummond Reed, Sovrin Foundation
  51. 51. did:sov:3k9dg356wdcj5gf2k9bw8kfg7a 047d599d4521480d9e1919481b024f29d2693f2 72d19473dbef971d7d529f6e9 Private
 Key Public Key cc2cd0ffde594d278c2d9b432f4748506a7f9f2 5141e485eb84bc188382019b6 Slide credit: Drummond Reed, Sovrin Foundation
  52. 52. did:sov:3k9dg356wdcj5gf2k9bw8kfg7a 047d599d4521480d9e1919481b024f29d2693f2 72d19473dbef971d7d529f6e9 Private
 Key Public Key cc2cd0ffde594d278c2d9b432f4748506a7f9f2 5141e485eb84bc188382019b6 Slide credit: Drummond Reed, Sovrin Foundation
  53. 53. { “Key”: “Value” } DID Decentralized Identifier DID Document JSON-LD document describing the entity identified by the DID Slide credit: Drummond Reed, Sovrin Foundation
  54. 54. 1. DID (for self-description) 2. Set of public keys (for verification) 3. Set of auth protocols (for authentication) 4. Set of service endpoints (for interaction) 5. Timestamp (for audit history) 6. Signature (for integrity) !90 The standard elements of a DID doc Slide credit: Drummond Reed, Sovrin Foundation
  55. 55. 1. DID (for self-description) 2. Set of public keys (for verification) 3. Set of auth protocols (for authentication) 4. Set of service endpoints (for interaction) 5. Timestamp (for audit history) 6. Signature (for integrity) !91 The standard elements of a DID doc Slide credit: Drummond Reed, Sovrin Foundation
  56. 56. 1. DID (for self-description) 2. Set of public keys (for verification) 3. Set of auth protocols (for authentication) 4. Set of service endpoints (for interaction) 5. Timestamp (for audit history) 6. Signature (for integrity) !92 The standard elements of a DID doc Slide credit: Drummond Reed, Sovrin Foundation
  57. 57. 1. DID (for self-description) 2. Set of public keys (for verification) 3. Set of auth protocols (for authentication) 4. Set of service endpoints (for interaction) 5. Timestamp (for audit history) 6. Signature (for integrity) !93 The standard elements of a DID doc Slide credit: Drummond Reed, Sovrin Foundation
  58. 58. 1. DID (for self-description) 2. Set of public keys (for verification) 3. Set of auth protocols (for authentication) 4. Set of service endpoints (for interaction) 5. Timestamp (for audit history) 6. Signature (for integrity) !94 The standard elements of a DID doc Slide credit: Drummond Reed, Sovrin Foundation
  59. 59. Institutions can Issue Verified (Digital) Credentials to Organizations
  60. 60. Verifiable Organizations Network British Columbia Government is building it, and its all up on GitHub
  61. 61. Verifiable Organizations Network
  62. 62. Verifiable Organizations Network
  63. 63. Verifiable Organizations Network OrgBookProfile a Business Public Business Permits
  64. 64. Verifiable Organizations Network OrgBookProfile a Business Business Owner Can Claim These Public Business Permits
  65. 65. Verifiable Organizations Network OrgBookProfile a Business Business Owner Can Claim These In the Verifiable Credentials Format Public Business Permits
  66. 66. Verifiable Organizations Network OrgBookProfile a Business Business Owner Can Claim These In the Verifiable Credentials Format In a Digital Wallet Public Business Permits
  67. 67. Verifiable Organizations Network HolderIssuer Verifier Issues 
 Claim Decentralized Identifiers (DIDs) Public Blockchain or other Decentralized Network Signs Claim Countersigns Claim Wallet Slide credit: Drummond Reed, Sovrin Foundation BC GOVERNMENT BC BUSINESS
  68. 68. Verifiable Organizations Network HolderIssuer Verifier Issues 
 Claim Decentralized Identifiers (DIDs) Public Blockchain or other Decentralized Network Signs Claim Countersigns Claim Verifies Signatures Wallet Slide credit: Drummond Reed, Sovrin Foundation BC GOVERNMENT BC BUSINESS CANADIAN GOVERNMENT
  69. 69. Verifiable Organizations Network HolderIssuer Verifier Issues 
 Claim Presents
 Claim Decentralized Identifiers (DIDs) Public Blockchain or other Decentralized Network Signs Claim Countersigns Claim Verifies Signatures Wallet Slide credit: Drummond Reed, Sovrin Foundation BC GOVERNMENT BC BUSINESS CANADIAN GOVERNMENT
  70. 70. HOW DO YOU KNOW ITS TRUE? Without…
  71. 71. HOW DO YOU KNOW ITS TRUE? Without…
  72. 72. HOW DO YOU KNOW ITS TRUE? Without…
  73. 73. !109
  74. 74. Create Addressable Identifiers Created and Owned by People
  75. 75. Self Sovereign Identity no facebook no phone number no email provider
  76. 76. NO PERSONALLY IDENTIFIABLE INFORMATION ENDS UP ON THE BLOCK CHAIN
  77. 77. Shared Ledgers
  78. 78. Different Blockchain Flavors Bitcoin,
 Ethereum, IOTA,
 Veres One Permissionless Permissioned Public Private Validation Access Hyperledger Sawtooth* Sovrin, IPDB Hyperledger (Fabric, Sawtooth, Iroha),
 R3 Corda,
 CU Ledger* in permissionless mode Slide credit: Drummond Reed, Sovrin Foundation
  79. 79. DID Layer The decentralized identity “stack” Cloud Layer Cloud Wallet Cloud Wallet Cloud Agent Cloud Agent Identity Owners Edge Layer Edge Wallet Edge Wallet Edge Agent Edge Agent Slide credit: Drummond Reed, Sovrin Foundation Identity Owners
  80. 80. HOW DO YOU KNOW ITS TRUE? Without…
  81. 81. HOW DO YOU KNOW ITS TRUE? Without…
  82. 82. HOW DO YOU KNOW ITS TRUE? Without…
  83. 83. It is essential that we change the culture around how technology is built now: • to put humanness first, • to center communities that have been marginalized in its creation to date • to design with awareness of threat models that have often been ignored until it’s too late.

  84. 84. Kaliya Young kaliya@IdentityWoman.net Get the Self-Sovereign Identity Scoop SSIScoop.com HumanFirst.Tech

×