SlideShare a Scribd company logo
1 of 63
Download to read offline
Highlights of
Internet Identity
Workshop (IIW)
#29
The latest and greatest developments in SSI
straight from the Internet Identity Workshop
that took place Oct 1- Oct 3 2019, Mt. View, CA
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Drummond Reed
Chief Trust Officer Evernym
@DrummondReed
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
● Chief Trust Officer, Evernym
● Trustee, Sovrin Foundation
● Chair, Sovrin Governance
Framework Working Group
● Co-Editor, W3C Decentral-
ized Identifier Specification
● All 29 Internet Identity
Workshops!
Who Am I?
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
What is Internet
Identity Workshop?
Internet Identity Workshop—Some Background
● First held in Berkeley CA in 2005
● Held every six months since then at the Computer History
Museum in Mountain View,
● Put on by Kaliya Young (@IdentityWoman), Phil Windley
(@windley), and Doc Searls (@dsearls)
● Complete history available at
http://www.internetidentityworkshop.com/
5
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Internet Identity Workshop—Some Background
● Runs for three days: Tue/Wed/Thur
● The format each day is entirely open space:
https://en.wikipedia.org/wiki/Open_Space_Technology
● The agenda is self-organized by the attendees each
morning—5 hour-long slots across 14 meeting rooms
● Lots of informal discussion and hallway meetings
● All-conference dinners Tuesday & Wednesday evenings
6
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Caveats about these Highlights
● I am just one attendee!
● I can only attend one of the dozen sessions in each time
slot (and I miss some due to side meetings/discussions)
● I self-select sessions on the topics I am most
interested/involved in
● If you talk to other attendees, you might get an entirely
different set of highlights
7
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#1: SSI is here for real
● 320 attendees!
● Biggest IIW ever
by 20%
● 25+ countries
● Big companies
● Small companies
● Universities
● Governments
● Consortia
● Developers
● Everyone!!
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
The fantastic
Heidi Nobuntu
Saul carefully
explains the
Open Space
process to 150
newbies
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#2: SSI and OpenID
are getting married!
It was inevitable
● OpenID Connect (OIDC) is the leading Internet-scale
federation protocol
○ Mature open standard with significant pockets of adoption
● But OpenID and SSI use different identity models
○ OIDC is identity-provider centric; SSI is credential-centric
○ SSI can trigger an explosion of new, portable credentials
● So it only makes sense that existing OpenID customers
want to start bridging to the new world of SSI
12
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
● In June, BC Gov issued
an RFP for integrating SSI
with Keycloak
● Mattr won the award and
developed a solution that
uses an Aries cloud agent
● This agent translates
between DIDComm/VCX
and OIDC
● Tobias Looker, Mattr CTO,
gave a demo
Solution #1: Bridging
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
● SIOP = OpenID Self-
Issued OpenID Provider
● With this solution, an SSI
wallet acts as its own
OpenID Provider
● The DIF DID Auth WG
has written a spec
● Evernym and Microsoft
showed the implementa-
tions they collaborated on
for a UK medical project
Solution #2: SIOP
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#3: SSI products
and services are
exploding
Demo Day was insane
● 25 different demos to see in 90 minutes
● 14 new SSI products and services
● 8 included independent SSI wallets
● 5 KYC (Know Your Customer) solutions
● Gluu, estatus, Transmute, Yes.com, ConsenSys, Vivvo,
eduGAIN, Workday, Duo, GET Group NA, Pico Labs, IBM,
DIF, Wireline, Streetcred ID, Kiva, Veridium, HearRo,
Spaceman ID, Blockstack, Xertify, Yubico, ID Ramp 16
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
The insanity
begins.
Margo Johnson
of Transmute
shows their
Transmute ID
platform.
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Workday showed
Workday
Credentials—
an entire
platform for
issuing, holding,
and verifying
credentials
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
All five startups
from the Sovrin
Incubator were
present and 3
gave demos.
This is
Spaceman ID.
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Streetcred ID
gave you a
digital wallet and
issued you a
verifiable
business card in
less than 5
minutes
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
esatus AG from
Germany
showed their
new SeLF
platform for
integrating SSI
with legacy IAM
systems
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
IdRamp demo’d
their solution for
using SSI with
enterprise
infrastructure
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Veridium CTO
Jack Callahan
demonstrated
privacy-
respecting
self-sovereign
biometric
credentials
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Not everything
was SSI—
David Kelts of
Idemia showed
how to share
ISO 18013-5
standard mobile
drivers licenses
over bluetooth,
NFC, and wifi
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#4: DIDs are baked in
DIDs are now being taken as a given in SSI
● In Sept the W3C formed the DID Working Group
● The first meeting was at W3C TPAC in Fukuoka Japan
○ 54 members, 18 companies
● There are now four major categories of DIDs
(ledger-based, peer-based, Layer 2, and alternative)
● All four types were present throughout IIW
26
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Dave Huseby,
Hyperledger
Security Maven,
held 2 sessions
on the did:git
method—with
the goal of
adoption by
developers
everywhere
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#5: DIDComm is the
next big thing
DIDComm is the core interop protocol for SSI
● It is how agents and wallets (and ideally hubs)
communicate
● It is how connections can be formed using a common DID
method (did:peer)
● It is the base protocol for verifiable credential exchange
(even across the different VC formats)
29
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Sam Curren of
the Sovrin
Foundation
hosted the first
DIDComm
session to a
packed house—
including Kim
Cameron
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Interest ran so
high that a
second session
was held
Wednesday—
to an even larger
crowd
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Stay tuned for news about how
Hyperledger Aries and DIF plan to
collaborate on DIDComm and other
Hyperledger RFCs (specs)
32
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#6: All 3 Verifiable
Credential 1.0 formats
are going strong
34
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#7: We are finally
converging on a full
interoperability stack
The SSI Stack
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Layer One:
DID Networks
(Public Ledgers)
Cryptographic
Trust
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Layer One:
DID Networks
(Public Ledgers)
Cryptographic
Trust
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Working Group
https://www.w3.org/2019/did-wg/
Layer One:
DID Networks
(Public Ledgers)
Cryptographic
Trust
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Layer Two:
DIDComm
Protocol Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Layer Two:
DIDComm
Protocol Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
https://wiki.hyperledger.org/display/aries
Layer Two:
DIDComm
Protocol Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Layer Two:
DIDComm
Protocol Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Layer Two:
DIDComm
Protocol Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
+HumanTrust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Layer Two:
DIDComm
Protocol
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential
Proof
Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
+HumanTrust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Layer Two:
DIDComm
Protocol
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential
Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
+HumanTrust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
https://www.w3.org/TR/vc-data-model/
Proof
Layer Two:
DIDComm
Protocol
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential
Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
+HumanTrust
Private Pairwise Peer DIDs
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Proof
Layer Two:
DIDComm
Protocol
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential
Agent + Wallet
Connection
Agent + Wallet
Cryptographic
Trust
+HumanTrust Layer Four:
Governance
Frameworks
Governance
Authority
Private Pairwise Peer DIDs
Publishes
Governance
Framework
Layer One:
DID Networks
(Public Ledgers)
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Proof
Doesn’t governance
applies at every layer?
The
Trust over IP Stack
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Layer One:
DID Networks
(Public Ledgers)
Agent/Wallet/Hub
Connection
Pairwise Pseudonymous Peer DIDs
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential ✔Proof
Agent/Wallet/Hub
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Trust over IP Technology Stack
Technical Trust
Human Trust
Governance
Authority
Publishes
Governance
Framework
> >
Layer Two:
DIDComm
Layer Four:
Governance
Frameworks
Layer One:
DID Networks
(Public Ledgers)
Layer Two:
DIDComm
Agent/Wallet/Hub
Connection
Pairwise Pseudonymous Peer DIDs
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential ✔Proof
Agent/Wallet/Hub
Layer Four:
Governance
Frameworks
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Trust over IP Technology Stack Trust over IP Governance Stack
Technical Trust
Human Trust
Governance
Authority
Publishes
Governance
Framework
> >
Layer One:
DID Networks
(Public Ledgers)
Layer Two:
DIDComm
Agent/Wallet/Hub
Connection
Pairwise Pseudonymous Peer DIDs
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential ✔Proof
Agent/Wallet/Hub
Layer Four:
Governance
Frameworks
Transaction
Author
Transaction
Endorser
Steward
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Trust over IP Technology Stack Trust over IP Governance Stack
Network Governance Frameworks
Technical Trust
Human Trust
Governance
Authority
Publishes
Governance
Framework
> >
Layer One:
DID Networks
(Public Ledgers)
Layer Two:
DIDComm
Agent/Wallet/Hub
Connection
Pairwise Pseudonymous Peer DIDs
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential ✔Proof
Agent/Wallet/Hub
Layer Four:
Governance
Frameworks
Hardware
Developer
Software
Developer
Agency
Transaction
Author
Transaction
Endorser
Steward
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Trust over IP Technology Stack Trust over IP Governance Stack
Network Governance Frameworks
Provider Governance Frameworks
Technical Trust
Human Trust
Governance
Authority
Publishes
Governance
Framework
> >
Layer One:
DID Networks
(Public Ledgers)
Layer Two:
DIDComm
Agent/Wallet/Hub
Connection
Pairwise Pseudonymous Peer DIDs
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential ✔Proof
Agent/Wallet/Hub
Layer Four:
Governance
Frameworks
Trust
Anchor
InsurerCredential
Registry
Hardware
Developer
Software
Developer
Agency
Transaction
Author
Transaction
Endorser
Steward
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Trust over IP Technology Stack Trust over IP Governance Stack
Network Governance Frameworks
Provider Governance Frameworks
Credential Governance Frameworks
Technical Trust
Human Trust
Governance
Authority
Publishes
Governance
Framework
> >
Layer One:
DID Networks
(Public Ledgers)
Layer Two:
DIDComm
Agent/Wallet/Hub
Connection
Pairwise Pseudonymous Peer DIDs
Issuer Verifier
Holder
Trust
Layer Three:
Credential
Exchange
Verifiable
Credential ✔Proof
Agent/Wallet/Hub
Layer Four:
Governance
Frameworks
Trust
Anchor
Insurer
Governance
Authority
Auditor Auditor
Accreditor
Credential
Registry
Hardware
Developer
Software
Developer
Agency
Transaction
Author
Transaction
Endorser
Steward
DID Method
DID Network
DID Method
DID Network
DID Method
DID Network
Trust over IP Technology Stack Trust over IP Governance Stack
Network Governance Frameworks
Provider Governance Frameworks
Credential Governance Frameworks
Technical Trust
Human Trust
Governance
Authority
Publishes
Governance
Framework
> >
Metasystem Governance Frameworks
Stay tuned for news about the Sovrin
Foundation moving to a “network of
networks” model based on a shared
metasystem governance framework
57
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
#8: We are
converging on
terminology too
The very last
session was
called to discuss
how we can turn
the Sovrin
Glossary into a
community-wide
SSI Glossary
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
We ran out of
time to finish the
discussion—but
@Identitywoman
(Kaliya) insisted
that we continue
AFTER closing
circle!
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
So a dozen
people met for
another half hour
and concluded to
start a new
Glossary Project
at DIF where the
glossary will be
maintained in a
github repo
SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
Questions?
Highlights of
Internet Identity
Workshop (IIW)
#29
The latest and greatest developments in SSI
straight from the Internet Identity Workshop
that took place Oct 1- Oct 3 2019, Mt. View, CA
This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Drummond Reed
Chief Trust Officer Evernym
@DrummondReed

More Related Content

What's hot

Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanDecentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
SSIMeetup
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
Blockchain España
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 

What's hot (20)

The State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellThe State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’Donnell
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanDecentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel HardmanIdentity and the quest for Self-Sovereign Identity - Daniel Hardman
Identity and the quest for Self-Sovereign Identity - Daniel Hardman
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
Verifiable Credentials 101 for SSI and Decentralized Digital Identity - Tyler...
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 

Similar to Internet Identity Workshop #29 highlights with Drummond Reed

Similar to Internet Identity Workshop #29 highlights with Drummond Reed (20)

Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
OpenChain Germany Work Group Meeting 2022-11-16
OpenChain Germany Work Group Meeting 2022-11-16OpenChain Germany Work Group Meeting 2022-11-16
OpenChain Germany Work Group Meeting 2022-11-16
 
OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07OpenChain Monthly Meeting North America - Europe - 2023-02-07
OpenChain Monthly Meeting North America - Europe - 2023-02-07
 
OpenChain Mini-Summit May 2023
OpenChain Mini-Summit May 2023OpenChain Mini-Summit May 2023
OpenChain Mini-Summit May 2023
 
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
 
Cilium + Istio with Gloo Mesh
Cilium + Istio with Gloo MeshCilium + Istio with Gloo Mesh
Cilium + Istio with Gloo Mesh
 
OpenChain Monthly Meeting 2022-11-01
OpenChain Monthly Meeting 2022-11-01OpenChain Monthly Meeting 2022-11-01
OpenChain Monthly Meeting 2022-11-01
 
OpenChain-Monthly-Meeting-2022-11-15
OpenChain-Monthly-Meeting-2022-11-15OpenChain-Monthly-Meeting-2022-11-15
OpenChain-Monthly-Meeting-2022-11-15
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
 
Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
 
CHIPS Alliance_Object Automation Inc_workshop
CHIPS Alliance_Object Automation Inc_workshopCHIPS Alliance_Object Automation Inc_workshop
CHIPS Alliance_Object Automation Inc_workshop
 
Securing your digital identity with drupal
Securing your digital identity with drupalSecuring your digital identity with drupal
Securing your digital identity with drupal
 
Cloud Security - I ain’t rocket science @ Club.cloud 20211103
Cloud Security - I ain’t rocket science @ Club.cloud 20211103Cloud Security - I ain’t rocket science @ Club.cloud 20211103
Cloud Security - I ain’t rocket science @ Club.cloud 20211103
 
Meetup srilanka
Meetup srilankaMeetup srilanka
Meetup srilanka
 
Great Open Source Compliance For Everyone (Version 3)
Great Open Source Compliance For Everyone (Version 3)Great Open Source Compliance For Everyone (Version 3)
Great Open Source Compliance For Everyone (Version 3)
 
OpenID Progress EEMA Conference
OpenID Progress EEMA ConferenceOpenID Progress EEMA Conference
OpenID Progress EEMA Conference
 
Enterprise-Grade DevOps Solutions for a Start Up Budget
Enterprise-Grade DevOps Solutions for a Start Up BudgetEnterprise-Grade DevOps Solutions for a Start Up Budget
Enterprise-Grade DevOps Solutions for a Start Up Budget
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger Indy
 
Securing your Cloud Environment v2
Securing your Cloud Environment v2Securing your Cloud Environment v2
Securing your Cloud Environment v2
 
How to Lead in IIoT
How to Lead in IIoTHow to Lead in IIoT
How to Lead in IIoT
 

More from SSIMeetup

Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 

More from SSIMeetup (15)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
 

Recently uploaded

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 

Recently uploaded (20)

Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 

Internet Identity Workshop #29 highlights with Drummond Reed

  • 1. Highlights of Internet Identity Workshop (IIW) #29 The latest and greatest developments in SSI straight from the Internet Identity Workshop that took place Oct 1- Oct 3 2019, Mt. View, CA This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org Drummond Reed Chief Trust Officer Evernym @DrummondReed
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives
  • 3. ● Chief Trust Officer, Evernym ● Trustee, Sovrin Foundation ● Chair, Sovrin Governance Framework Working Group ● Co-Editor, W3C Decentral- ized Identifier Specification ● All 29 Internet Identity Workshops! Who Am I? SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 5. Internet Identity Workshop—Some Background ● First held in Berkeley CA in 2005 ● Held every six months since then at the Computer History Museum in Mountain View, ● Put on by Kaliya Young (@IdentityWoman), Phil Windley (@windley), and Doc Searls (@dsearls) ● Complete history available at http://www.internetidentityworkshop.com/ 5 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 6. Internet Identity Workshop—Some Background ● Runs for three days: Tue/Wed/Thur ● The format each day is entirely open space: https://en.wikipedia.org/wiki/Open_Space_Technology ● The agenda is self-organized by the attendees each morning—5 hour-long slots across 14 meeting rooms ● Lots of informal discussion and hallway meetings ● All-conference dinners Tuesday & Wednesday evenings 6 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 7. Caveats about these Highlights ● I am just one attendee! ● I can only attend one of the dozen sessions in each time slot (and I miss some due to side meetings/discussions) ● I self-select sessions on the topics I am most interested/involved in ● If you talk to other attendees, you might get an entirely different set of highlights 7 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 8. #1: SSI is here for real
  • 9. ● 320 attendees! ● Biggest IIW ever by 20% ● 25+ countries ● Big companies ● Small companies ● Universities ● Governments ● Consortia ● Developers ● Everyone!! SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 10. The fantastic Heidi Nobuntu Saul carefully explains the Open Space process to 150 newbies SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 11. #2: SSI and OpenID are getting married!
  • 12. It was inevitable ● OpenID Connect (OIDC) is the leading Internet-scale federation protocol ○ Mature open standard with significant pockets of adoption ● But OpenID and SSI use different identity models ○ OIDC is identity-provider centric; SSI is credential-centric ○ SSI can trigger an explosion of new, portable credentials ● So it only makes sense that existing OpenID customers want to start bridging to the new world of SSI 12 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 13. ● In June, BC Gov issued an RFP for integrating SSI with Keycloak ● Mattr won the award and developed a solution that uses an Aries cloud agent ● This agent translates between DIDComm/VCX and OIDC ● Tobias Looker, Mattr CTO, gave a demo Solution #1: Bridging SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 14. ● SIOP = OpenID Self- Issued OpenID Provider ● With this solution, an SSI wallet acts as its own OpenID Provider ● The DIF DID Auth WG has written a spec ● Evernym and Microsoft showed the implementa- tions they collaborated on for a UK medical project Solution #2: SIOP SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 15. #3: SSI products and services are exploding
  • 16. Demo Day was insane ● 25 different demos to see in 90 minutes ● 14 new SSI products and services ● 8 included independent SSI wallets ● 5 KYC (Know Your Customer) solutions ● Gluu, estatus, Transmute, Yes.com, ConsenSys, Vivvo, eduGAIN, Workday, Duo, GET Group NA, Pico Labs, IBM, DIF, Wireline, Streetcred ID, Kiva, Veridium, HearRo, Spaceman ID, Blockstack, Xertify, Yubico, ID Ramp 16 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 17. The insanity begins. Margo Johnson of Transmute shows their Transmute ID platform. SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 18. Workday showed Workday Credentials— an entire platform for issuing, holding, and verifying credentials SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 19. All five startups from the Sovrin Incubator were present and 3 gave demos. This is Spaceman ID. SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 20. Streetcred ID gave you a digital wallet and issued you a verifiable business card in less than 5 minutes SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 21. esatus AG from Germany showed their new SeLF platform for integrating SSI with legacy IAM systems SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 22. IdRamp demo’d their solution for using SSI with enterprise infrastructure SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 23. Veridium CTO Jack Callahan demonstrated privacy- respecting self-sovereign biometric credentials SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 24. Not everything was SSI— David Kelts of Idemia showed how to share ISO 18013-5 standard mobile drivers licenses over bluetooth, NFC, and wifi SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 25. #4: DIDs are baked in
  • 26. DIDs are now being taken as a given in SSI ● In Sept the W3C formed the DID Working Group ● The first meeting was at W3C TPAC in Fukuoka Japan ○ 54 members, 18 companies ● There are now four major categories of DIDs (ledger-based, peer-based, Layer 2, and alternative) ● All four types were present throughout IIW 26 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 27. Dave Huseby, Hyperledger Security Maven, held 2 sessions on the did:git method—with the goal of adoption by developers everywhere SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 28. #5: DIDComm is the next big thing
  • 29. DIDComm is the core interop protocol for SSI ● It is how agents and wallets (and ideally hubs) communicate ● It is how connections can be formed using a common DID method (did:peer) ● It is the base protocol for verifiable credential exchange (even across the different VC formats) 29 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 30. Sam Curren of the Sovrin Foundation hosted the first DIDComm session to a packed house— including Kim Cameron SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 31. Interest ran so high that a second session was held Wednesday— to an even larger crowd SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 32. Stay tuned for news about how Hyperledger Aries and DIF plan to collaborate on DIDComm and other Hyperledger RFCs (specs) 32 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 33. #6: All 3 Verifiable Credential 1.0 formats are going strong
  • 34. 34 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 35. #7: We are finally converging on a full interoperability stack
  • 36. The SSI Stack SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 37. Layer One: DID Networks (Public Ledgers) Cryptographic Trust DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network
  • 38. Layer One: DID Networks (Public Ledgers) Cryptographic Trust DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Working Group https://www.w3.org/2019/did-wg/
  • 39. Layer One: DID Networks (Public Ledgers) Cryptographic Trust DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network
  • 40. Layer Two: DIDComm Protocol Agent + Wallet Connection Agent + Wallet Cryptographic Trust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network
  • 41. Layer Two: DIDComm Protocol Agent + Wallet Connection Agent + Wallet Cryptographic Trust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network https://wiki.hyperledger.org/display/aries
  • 42. Layer Two: DIDComm Protocol Agent + Wallet Connection Agent + Wallet Cryptographic Trust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network
  • 43. Layer Two: DIDComm Protocol Agent + Wallet Connection Agent + Wallet Cryptographic Trust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network
  • 44. Layer Two: DIDComm Protocol Agent + Wallet Connection Agent + Wallet Cryptographic Trust +HumanTrust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network
  • 45. Layer Two: DIDComm Protocol Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential Proof Agent + Wallet Connection Agent + Wallet Cryptographic Trust +HumanTrust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network
  • 46. Layer Two: DIDComm Protocol Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential Agent + Wallet Connection Agent + Wallet Cryptographic Trust +HumanTrust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network https://www.w3.org/TR/vc-data-model/ Proof
  • 47. Layer Two: DIDComm Protocol Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential Agent + Wallet Connection Agent + Wallet Cryptographic Trust +HumanTrust Private Pairwise Peer DIDs Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network Proof
  • 48. Layer Two: DIDComm Protocol Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential Agent + Wallet Connection Agent + Wallet Cryptographic Trust +HumanTrust Layer Four: Governance Frameworks Governance Authority Private Pairwise Peer DIDs Publishes Governance Framework Layer One: DID Networks (Public Ledgers) DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network DID Method DID Network Proof
  • 50. The Trust over IP Stack SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 51. Layer One: DID Networks (Public Ledgers) Agent/Wallet/Hub Connection Pairwise Pseudonymous Peer DIDs Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential ✔Proof Agent/Wallet/Hub DID Method DID Network DID Method DID Network DID Method DID Network Trust over IP Technology Stack Technical Trust Human Trust Governance Authority Publishes Governance Framework > > Layer Two: DIDComm Layer Four: Governance Frameworks
  • 52. Layer One: DID Networks (Public Ledgers) Layer Two: DIDComm Agent/Wallet/Hub Connection Pairwise Pseudonymous Peer DIDs Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential ✔Proof Agent/Wallet/Hub Layer Four: Governance Frameworks DID Method DID Network DID Method DID Network DID Method DID Network Trust over IP Technology Stack Trust over IP Governance Stack Technical Trust Human Trust Governance Authority Publishes Governance Framework > >
  • 53. Layer One: DID Networks (Public Ledgers) Layer Two: DIDComm Agent/Wallet/Hub Connection Pairwise Pseudonymous Peer DIDs Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential ✔Proof Agent/Wallet/Hub Layer Four: Governance Frameworks Transaction Author Transaction Endorser Steward DID Method DID Network DID Method DID Network DID Method DID Network Trust over IP Technology Stack Trust over IP Governance Stack Network Governance Frameworks Technical Trust Human Trust Governance Authority Publishes Governance Framework > >
  • 54. Layer One: DID Networks (Public Ledgers) Layer Two: DIDComm Agent/Wallet/Hub Connection Pairwise Pseudonymous Peer DIDs Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential ✔Proof Agent/Wallet/Hub Layer Four: Governance Frameworks Hardware Developer Software Developer Agency Transaction Author Transaction Endorser Steward DID Method DID Network DID Method DID Network DID Method DID Network Trust over IP Technology Stack Trust over IP Governance Stack Network Governance Frameworks Provider Governance Frameworks Technical Trust Human Trust Governance Authority Publishes Governance Framework > >
  • 55. Layer One: DID Networks (Public Ledgers) Layer Two: DIDComm Agent/Wallet/Hub Connection Pairwise Pseudonymous Peer DIDs Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential ✔Proof Agent/Wallet/Hub Layer Four: Governance Frameworks Trust Anchor InsurerCredential Registry Hardware Developer Software Developer Agency Transaction Author Transaction Endorser Steward DID Method DID Network DID Method DID Network DID Method DID Network Trust over IP Technology Stack Trust over IP Governance Stack Network Governance Frameworks Provider Governance Frameworks Credential Governance Frameworks Technical Trust Human Trust Governance Authority Publishes Governance Framework > >
  • 56. Layer One: DID Networks (Public Ledgers) Layer Two: DIDComm Agent/Wallet/Hub Connection Pairwise Pseudonymous Peer DIDs Issuer Verifier Holder Trust Layer Three: Credential Exchange Verifiable Credential ✔Proof Agent/Wallet/Hub Layer Four: Governance Frameworks Trust Anchor Insurer Governance Authority Auditor Auditor Accreditor Credential Registry Hardware Developer Software Developer Agency Transaction Author Transaction Endorser Steward DID Method DID Network DID Method DID Network DID Method DID Network Trust over IP Technology Stack Trust over IP Governance Stack Network Governance Frameworks Provider Governance Frameworks Credential Governance Frameworks Technical Trust Human Trust Governance Authority Publishes Governance Framework > > Metasystem Governance Frameworks
  • 57. Stay tuned for news about the Sovrin Foundation moving to a “network of networks” model based on a shared metasystem governance framework 57 SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 58. #8: We are converging on terminology too
  • 59. The very last session was called to discuss how we can turn the Sovrin Glossary into a community-wide SSI Glossary SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 60. We ran out of time to finish the discussion—but @Identitywoman (Kaliya) insisted that we continue AFTER closing circle! SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 61. So a dozen people met for another half hour and concluded to start a new Glossary Project at DIF where the glossary will be maintained in a github repo SSIMeetup.orgThis presentation is released under a Creative Commons license. (CC BY-SA 4.0).
  • 63. Highlights of Internet Identity Workshop (IIW) #29 The latest and greatest developments in SSI straight from the Internet Identity Workshop that took place Oct 1- Oct 3 2019, Mt. View, CA This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org Drummond Reed Chief Trust Officer Evernym @DrummondReed