pii

Mobile identity now opening even more doors for college students

We use multiple identity instruments many times per week without much thought and, for the most part, college students are a great example of identity consumers. Students typically use a single identity document for many daily functions such as food service, dorm entry and exams, and event participation registration. Next-level student identification IBM has teamed […]

Continue reading

IBM Blockchain Trusted Identity: Sovrin Steward closed beta offering

Individuals, organizations, and things are not in control of their identity in the digital world. Everything is rooted in usernames and passwords, controlled by identity providers and third parties, creating a much-needed missing layer for identity on the Internet. At IBM, we have been doing a lot in the decentralized identity space. We’ve done some […]

Continue reading

Self-sovereign identity: Unraveling the terminology

Several years ago, the Sovrin vision was introduced using a dot metaphor to describe a future whereby individuals would be able to take back control of their identity and participate at a peer-to-peer level with their online and offline relationships. Today the landscape of supporting open communities — network, code and standards — to achieve […]

Continue reading

Self-sovereign identity: Why blockchain?

One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, “Why blockchain?” This question tends to stem from the notion that data associated with a person’s identity is destined to be stored, shared and used for verification on some form of distributed ledger technology. […]

Continue reading

Securing your cross-domain file transfers with blockchain

As I discussed in a previous article, a Hyperledger Fabric (HLF) blockchain network hosted on a high assurance platform is well suited for secure information exchanges across network security domains — for example, exchanging unclassified information between a classified and unclassified network. However, when the information exchanged includes image, video, audio or other large file […]

Continue reading

Digital identity interactions

Digital identity solutions can be described using a set of identity verification interactions types that pertain to both in-person and online experiences. Our daily lives are filled with a variety of identity interaction experiences. These daily life experiences may include a visit to the bank clerk, entering the airport or a login to your utility company’s […]

Continue reading

A new era in personal identity: Safer, smarter, more secure

Most U.S. citizens have some type of Government Issued Identity Instrument (G3I) for identity verification. The most common form is a driver’s license. But we also have a plethora of other identity instruments that we carry around every day; healthcare and prescription cards, employee badges, library cards, gym memberships, gun ownership, fishing and hunting licenses, store […]

Continue reading