Dan Gisolfi

Decentralized Identity: An alternative to password-based authentication

Many experts say that a password-based login is an insecure approach to online interactions and that multi-factor schemes add friction that reduce user adoption and productivity. Obtaining assured authentication of a person’s identity while adhering to new data privacy laws and regulations presents a minefield of security and customer experiences issues that are costly and […]

Continue reading

Self-sovereign identity: Unraveling the terminology

Several years ago, the Sovrin vision was introduced using a dot metaphor to describe a future whereby individuals would be able to take back control of their identity and participate at a peer-to-peer level with their online and offline relationships. Today the landscape of supporting open communities — network, code and standards — to achieve […]

Continue reading

Self-sovereign identity: Why blockchain?

One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, “Why blockchain?” This question tends to stem from the notion that data associated with a person’s identity is destined to be stored, shared and used for verification on some form of distributed ledger technology. […]

Continue reading

Self-sovereign identity: Our recent activity as a Sovrin Steward

During the most recent Internet Identity Workshop, IBM announced our entrance into the decentralized identity arena by joining the Sovrin Foundation. The days that followed have been busy and exciting, and highlighted by both IBM and community milestones. Developer enablement To help developers get acquainted with The Linux Foundation’s Hyperledger Indy concepts we contributed two […]

Continue reading

Digital identity interactions

Digital identity solutions can be described using a set of identity verification interactions types that pertain to both in-person and online experiences. Our daily lives are filled with a variety of identity interaction experiences. These daily life experiences may include a visit to the bank clerk, entering the airport or a login to your utility company’s […]

Continue reading

Identity requests: Let us count the ways

We use our identity documents many times per week without much thought. Verification of our identity or a specific privilege tied to our identity is so commonplace that we rarely question the request. Essentially, identity interactions are part of our daily life experiences. While most people in the US use a driver’s license, any form […]

Continue reading

Multi-document verification in a digital world

Nearly everyone has some form of Government Issued Identity Instrument (G3I). Even though a driver’s license conveys the privilege to operate certain types of vehicles, it is also the most commonly used form of G3I. The table below lists several use cases and indicates whether an actual driver’s license (DL) or a G3I document is […]

Continue reading

A new era in personal identity: Safer, smarter, more secure

Most U.S. citizens have some type of Government Issued Identity Instrument (G3I) for identity verification. The most common form is a driver’s license. But we also have a plethora of other identity instruments that we carry around every day; healthcare and prescription cards, employee badges, library cards, gym memberships, gun ownership, fishing and hunting licenses, store […]

Continue reading

Moving beyond barcodes

We all have many plastic cards in our wallets — driver’s license, credit cards, healthcare cards and more.  Many have some mechanism for exchanging data with a reader either via a barcode, magnetic strip or chip. Unfortunately, these mechanisms for exchanging data do not always provide the best authentication. Barcodes are for automation, not identification […]

Continue reading