pii
Mobile identity now opening even more doors for college students
We use multiple identity instruments many times per week without much thought and, for the most part, college students are a great example of identity consumers. Students typically use a single identity document for many daily functions such as food service, dorm entry and exams, and event participation registration. Next-level student identification IBM has teamed […]
IBM Blockchain Trusted Identity: Sovrin Steward closed beta offering
Individuals, organizations, and things are not in control of their identity in the digital world. Everything is rooted in usernames and passwords, controlled by identity providers and third parties, creating a much-needed missing layer for identity on the Internet. At IBM, we have been doing a lot in the decentralized identity space. We’ve done some […]
Self-sovereign identity: Unraveling the terminology
Several years ago, the Sovrin vision was introduced using a dot metaphor to describe a future whereby individuals would be able to take back control of their identity and participate at a peer-to-peer level with their online and offline relationships. Today the landscape of supporting open communities — network, code and standards — to achieve […]
Self-sovereign identity: Why blockchain?
One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, “Why blockchain?” This question tends to stem from the notion that data associated with a person’s identity is destined to be stored, shared and used for verification on some form of distributed ledger technology. […]
Securing your cross-domain file transfers with blockchain
As I discussed in a previous article, a Hyperledger Fabric (HLF) blockchain network hosted on a high assurance platform is well suited for secure information exchanges across network security domains — for example, exchanging unclassified information between a classified and unclassified network. However, when the information exchanged includes image, video, audio or other large file […]
Digital identity interactions
Digital identity solutions can be described using a set of identity verification interactions types that pertain to both in-person and online experiences. Our daily lives are filled with a variety of identity interaction experiences. These daily life experiences may include a visit to the bank clerk, entering the airport or a login to your utility company’s […]
A new era in personal identity: Safer, smarter, more secure
Most U.S. citizens have some type of Government Issued Identity Instrument (G3I) for identity verification. The most common form is a driver’s license. But we also have a plethora of other identity instruments that we carry around every day; healthcare and prescription cards, employee badges, library cards, gym memberships, gun ownership, fishing and hunting licenses, store […]