Wifi stuck on validating identity

Rated 4.84/5 based on 753 customer reviews

in commerce, there are governments, banks, large websites, usign VCs. have to extract the payer first to get to the diagnosis ... sat down to figure out how to do this on a distributed ledger ... the nature of the challenge Moore's law resulted in increase in interaction volumes and densities ... being in a cost center is not a great place to be; you want to be in a profit center ... Sic Hunt Draones s/Dracones Talk about the 13 global risk trends ... you are seaking insights; but there is also intrusion ... those get quite large, little concerned around size of expression. We're not looking for just users making these statements, we're looking for devices... or else it is difficult to extract certain kinds of data ... parties responsible for capturing and setting the information ... but we did not have the same problems, different in kind problems are now more about risk ... notion of identity is locust of duty and liability and rights and value drive identity ... Now looking at Wild Law -- being asked to speculate ... problem of de-risk things but we don't know what the terms are and their definitions ... We have a spec, we're tryign to wrap up ZKP and JWT support... Looking at clusters of information; does that org exists and is it an importer ... had to figure out how to make a legal, compliant distributed ledger that improves the supply chain ... with distributed ledger we could identity products coming in, the provenance ... supply chain side, we could get supplier into the front end ... we added to transaction that crossed border, ID who owned, who is responsible, so then US Customs could ask questions on it ... we were able to take advantage of the distributed ledger to make these claims ... it all hinged on the DIDs, Verifiable Credentials and have a process to capture the information and the proof ... to claim differential rate; they would supply a pallet worth of documentation ... regulations require signatures of taking custody ...

The Android Operating System has a reputation of varying slightly from one manufacturer to another.

There are a couple of different issues here - DID authenticates DID DOcument, strongly make claim about DID Document... Using a DID Resolver to authenticate - you have DID, you have key material associated with that... not about proving we're over the age of XYZ, we just prove that we have control over a DID. We worked on a paper around Rebooting the Web of Trust... If you have public key information, you can know that anyone that has private key is authenticated. We tried to analyze this stuff - different scenarios / different flows - there are many, so DID Auth isn't just one thing... just because someone asks for a VC or other things, doens't mean I have to give it to them/comply... Where do you see DID and DID Auth fit into the larger picture... I want to prove my age, SSN, I thought DIDs were a means to an end... Scalability - at what scale are we talking about... @[email protected]: Interop from perspective of web developers - help browsers understand what APIs they should be understanding so developers can focus on clear stories so developers can focus on stuff that's not passwords or authn. delegation was lead by an assistant secretary general of NATO ... interoperations were walking over from one tent to another ... he explained passport, infocards, what has morphed into azure infrastructure ...

Authentication block points to public key - who has control of the DID? we need people that have experience with these systems. but at some point we need something like a DID DOcument... , I could provide DID and DID Auth, prove that's who I am... centralized authorities are not always excited about decentralized solutions. @[email protected]: Adoption - will end users understand value proposition of DIDs, what they get? Manu knows I worked on healthcare and life sciences systems and asked me talk about that in this space ... at Microsoft I worked five years for the Health solutions group ... those of us interested in healthcare invited us ... and field hospitals are meant to be the health services ... Secy General went on to talk about two Dutch marines and two American operating in squads ...

This is saying we're using the BTCR method spec, run it through the universal resolver, produces a DID Document. identifier tells you which block, which transaction, to find the transaction in. Resolver knows, per method spec, how to get information, how to return this thing. so, DID Document has keys, authentication, services, signatures, timestamps. There doesn't seem to be cross-blockchain interop... including keys that are compatible with say a different blockchain w/ different proof formats, PGP keys in there, information that lets you allow you to leverage FIDO. There are things like sigma proofs, ZKPs, private keys in one curve equivalent to private keys in antoehr group... you don't want to use something on a blockchain that can't be rewritten... Slides -- https://docs.google.com/presentation/d/1TSMW5hckaaaybp V9OVe Nb WO1QE_Os MP3Pc3Gov Afvjw/edit Hi, working in CCG and DIF, and Sovrin... important, web page uses DID Resolver to find DID, then find public key, then verify that the signature on the authentication was signed correctly. I cannot speak on behalf of the gov't or other gov'ts but happy to bring my perspectives as a government guy ... In Canada, gov't can mean many things; different levels, peoples We are small, 4 million, but we operate across a great number of areas [reads slides] ... from and identity perspective, we operate at the base ... we leverage two things; the popularity of driving ... we created a drivers license and health care card combined ... no personal information other than the chip number ... authentication tech can become a party to all of the transactions that unfold; we don't think that should happen that way ... when we make our tech dependent upon others, they feel they are forced to adopt something; gets us on the wrong side ... every transaction can be spin through account recovery ... we would not know how our own unique approach would scale ... but if tied to benefits, then it's another story [slide 8] ... we are looking for an architecture that would operate more like real world ... often those are privately owned; have you run into arrangements with private infrastructure that will be more reliable? services different in other contexts, but any analogies used for critical infrastructure that could be used reliability for gov't you are unique in that you have an ecosystem adopt your services ... but you could not do this for Marines was a standing joke ... so the lede of my story was 'if you want to go to hell, talk about multiple forests' ...

that document can contain other key material from other places... Keep questions and comments coming throughout two days here... This is one example for u Port - web page - mobile app authentication... With a mobile app, private key corresponding to DID, I can provide response to QRCode - post it back to web page... I am with the gov't of BC; I don't view myself representing a vertical, but a government ... so a lot going on in our world for identity information We have a legacy system ... we invented a BC services card and a provincial identity management info program ... we don't own, control or have accountability over that ... not clear to us what happens when things are lost, account recovery process is difficult ... our small province cannot defend against the threat model ... You don't interact with gov't as much as other entities ... no one has mounted an argument about your traffic ticket ... Afganistan had 1200 operational aircraft that knows how to broadcast communications ...

Leave a Reply