Self-Sovereign Identity

Lifetime portable identity for any person, organization or thing that does not depend on any centralized authority and can never be taken away.

Self-sovereign identity: Unraveling the terminology

Several years ago, the Sovrin vision was introduced using a dot metaphor to describe a future whereby individuals would be able to take back control of their identity and participate at a peer-to-peer level with their online and offline relationships. Today the landscape of supporting open communities — network, code and standards — to achieve […]

Continue reading

Self-sovereign identity: Why blockchain?

One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, “Why blockchain?” This question tends to stem from the notion that data associated with a person’s identity is destined to be stored, shared and used for verification on some form of distributed ledger technology. […]

Continue reading

Self-sovereign identity: Our recent activity as a Sovrin Steward

During the most recent Internet Identity Workshop, IBM announced our entrance into the decentralized identity arena by joining the Sovrin Foundation. The days that followed have been busy and exciting, and highlighted by both IBM and community milestones. Developer enablement To help developers get acquainted with The Linux Foundation’s Hyperledger Indy concepts we contributed two […]

Continue reading

Collaboration: Unlocking decentralized, digital identity management through blockchain

Identity theft is an all too common occurrence. Our personal information is not under our control and lives in repositories that are targets for hackers. The Identity Theft Resource Center recorded 1,339 breaches impacting over 170 million records in the U.S. in 2017 alone. The global numbers are so staggering that no one has been able to […]

Continue reading

Paving the road to self-sovereign identity with blockchain, open standards

Imagine a world in which you always have peace of mind that your personal information is safe. Imagine a world in which your information cannot be shared without your clear, explicit consent at the time of the transaction; where you decide who can access what information, when, and for how long. In this world, you […]

Continue reading