trusted identity

Storage for blockchain and modern distributed database processing

IBM Blockchain is transforming enterprise capabilities across industries, fostering new insights and decisions: from trust and transparency in our food using IBM Food Trust™, to digitization and transparency of trade using TradeLens, to transforming digital identity into trusted identity using IBM Blockchain Trusted Identity, to redefining access to money for people and businesses everywhere using […]

Continue reading

Blockchain for trusted IT service management

Blockchain-enabled self-sovereign identity (SSI) facilitates and secures all IT service management (ITSM) processes by providing assured, trusted identity and credentials for all configuration items (CIs) throughout their entire lifecycle. With SSI, every ITSM-applicable entity — every participating organization, person, and managed CI (network device, software instance, and others) — can be identified, identifiable, credentialed and […]

Continue reading

Mobile identity now opening even more doors for college students

We use multiple identity instruments many times per week without much thought and, for the most part, college students are a great example of identity consumers. Students typically use a single identity document for many daily functions such as food service, dorm entry and exams, and event participation registration. Next-level student identification IBM has teamed […]

Continue reading

Decentralized Identity: An alternative to password-based authentication

Many experts say that a password-based login is an insecure approach to online interactions and that multi-factor schemes add friction that reduce user adoption and productivity. Obtaining assured authentication of a person’s identity while adhering to new data privacy laws and regulations presents a minefield of security and customer experiences issues that are costly and […]

Continue reading

IBM Blockchain Trusted Identity: Sovrin Steward closed beta offering

Individuals, organizations, and things are not in control of their identity in the digital world. Everything is rooted in usernames and passwords, controlled by identity providers and third parties, creating a much-needed missing layer for identity on the Internet. At IBM, we have been doing a lot in the decentralized identity space. We’ve done some […]

Continue reading

Solving the cross-border need for vehicle and driver identity with blockchain

Increasingly we use our vehicles to travel internationally. While international travel becomes easier, vehicle related regulatory processes remain country specific. Many stake holders in the vehicle life cycle are hindered by this, from manufacturing to transport services, and from import to scrap processes. As a private citizen, you are not central to the process and […]

Continue reading

Self-sovereign identity: Unraveling the terminology

Several years ago, the Sovrin vision was introduced using a dot metaphor to describe a future whereby individuals would be able to take back control of their identity and participate at a peer-to-peer level with their online and offline relationships. Today the landscape of supporting open communities — network, code and standards — to achieve […]

Continue reading

Self-sovereign identity: Why blockchain?

One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, “Why blockchain?” This question tends to stem from the notion that data associated with a person’s identity is destined to be stored, shared and used for verification on some form of distributed ledger technology. […]

Continue reading

How do we start tackling the existing identity problem?

Identity and control of personal identity is top of mind, given recent events as well as the European Union’s General Data Protection Regulation (GDPR). A lot of our identity is shared without our explicit consent, gets stored in locations we are unaware of, and when compromised creates tremendous setbacks. Almost everything we do in the […]

Continue reading