Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Digital Nation's Infrastructure Presentation

403 vues

Publié le

Presentation about Digital Nation's Infrastructure from the Track Deep Dive in Preparation for Odyssey Hackathon 2019

  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

Digital Nation's Infrastructure Presentation

  1. 1. Track Deep Dive Digital Nation’s Infrastructure February 7 KVK Rotterdam
  2. 2. Moderator BEN SCHUTTENBELD
  3. 3. 9.30 Welcome on behalf of all challenge-owners (KVK) 9.45 The Odyssey Hackathon – What can you achieve by participating? (Rutger van Zuidam – CEO of DutchChain & Odyssey) 10.00 Developments in Blockchain, exchanging privacy- sensitive information and the future of a national digital infrastructure (Zeki Erkin, Assistant Professor in Cyber Security and Privacy at Delft University of Technology) 10.30 Challenge 1 by the Dutch Ministry of Justice and Security – Presentation and Q&A: a Government Backed Protocol for Digital Permissions (Flores Bakker – Enterprise Architect for the Ministry of Finance) Program Overview
  4. 4. 11.15 Extra support of IOTA for Challenge 1 (Dave de Fijter, IOTA Foundation) 11.30 Coffee Break and Early Lunch 12.00 Challenge 2 by Dutch Chamber of Commerce – Becoming an oracle in the Digital Infrastructure of a Nation (Geerten Verweij, developer of the Dutch Chamber of Commerce’s Innovation Lab) 12.40 Challenge 3 by Kadaster – Building a Distributed Data Ecosystem (Nick Apeldoorn, ICT Architect at Kadaster) 13.30 End of plenary program – Ample time to Connect
  5. 5. KVK Welcome on Behalf of all Challenge-owners
  6. 6. Rutger Van Zuidam CEO of DutchChain & Odyssey THE ODYSSEY HACKATHON What can you achieve by participating?
  7. 7. We believe…. technology like blockchain, crypto currencies, AI, IOT, open digital public infrastructure and the digital commons can unlock completely new ways of interconnected mass collaboration to establish the breakthrough progress we need in all fields of our society and all sectors of our economy.
  8. 8. Ecosystem transformation
  9. 9. Odyssey Hackathon 11-15 April 2019 Thursday April 11: Arrive and register in Groningen Masterclasses Opening party in DOT
  10. 10. Odyssey Hackathon 11-15 April 2019 Friday April 12: Grand opening Validate & pivot Saturday April 13: Go go go! Sunday April 14: Jury assessment
  11. 11. Monday April 15: Acceleration Conference Odyssey Hackathon 11-15 April 2019
  12. 12. Team selection Ultimate deadline to register February 25
  13. 13. Zeki Erkin Delft University of Technology Developments in Blockchain Exchanging privacy-sensitive information and the future of a national digital infrastructure
  14. 14. Flores Bakker Enterprise Architect for the Ministry of Finance Challenge 1 by the Dutch Ministry of Justice and Security Presentation and Q&A: A Government Backed Protocol for Digital Permissions
  15. 15. Challenge: Protocol for approval management How to register and communicate digital permissions on a global scale Flores Bakker Enterprise Architect Ministry of Finance in cooperation with the Ministry of Justice and Security
  16. 16. Introduction 26
  17. 17. Approval and consent › We approve and consent every day in some form or way; › We approve an action to be taken or we consent with the status of an entity (thing, process); › We approve as business co- worker, civil servant, civilian or other; › We approve and consent increasingly through digital means; 27
  18. 18. 28 Are you following me?
  19. 19. Cookie requests 29 › More and more companies are tracking individual persons › More and more information is being sold to third parties › Approval is asked... › ...but where is my ‘red button’ in case I want to retract my given approval? › Do I really know and control which parties are using my personal information and in what way? ? ?
  20. 20. More examples › Consent requests for the use of your personal or your company’s information by other parties › Approval requests for copyright licenses › Approval requests for budgetting and purchasing within an organisation › Consent requests for the accurate representation of a witness account › Consent requests with the status of an item of property or work (inspection) › ...and many more 30
  21. 21. Why do we approve? › We approve and consent because we have the legal power to do so; › We approve and consent because there are legal consequences in some form or way for us or the organisations on behalf of whom we are approving or consenting; 31
  22. 22. The power to consent › The power to consent is actually the power to change a legal relationship › Based upon the framework of fundamental legal concepts by Hohfeld (1918) › Approving or consenting leads to a change in the legal position of a stakeholder, resulting in more or less rights and duties for the stakeholder in question. 32
  23. 23. Theory: rational decision making › Approving is a form of decision making; › Decision Making Theory identifies seven phases in the rational decision making model; › Now we can define what is true informed consent: – Clear context – Clear consequences – Clear risks › Approving needs trust in the accuracy, completeness and up-to-date presentation of this information position. 33
  24. 24. Reality: intuitive decision making › In reality we are not always that rational; › Intuitive decision making is often the way decisions are made in real life, based on cues, patterns and action scripts; › Intuitive decision making needs trust in the strength of those cues, patterns and action scripts; › Intuitive decision making should not be denied as it is human to do so. The solution lies in combining it with rational decision making. 34
  25. 25. Trust is an important aspect of consent › Trust is built upon: – Fully Informed Consent – Non-repudiation (authenticity, integrity) – Uniformity – Compliancy – Agility – Adequate infrastructure – Resiliency – Strong cues, patterns, action scripts – User friendliness 35
  26. 26. The challenge › Develop an open source, decentralized and government backed protocol for registering and communicating digital permissions; › Re-usable for any type of stakeholder, approval process and application; › High trust; › For civilian, governmental and commercial use. 36
  27. 27. Properties of the solution › Supports non-repudiation (authenticity and integrity) and other trust aspects; › Supports fully informed consent (context, consequences and risks) but also strong cues and patterns; › Registers exact information position upon which a stakeholder will give his response; › Uniform protocol across the globe; › Evolvability – future changes to the protocol (new laws, new processses, etcetera) should be implemented easy and without the possibility of corrupting older approval transactions; › Open Source. 37
  28. 28. Innovation – think outside the box › Standardised contract terms across the globe? › Contract terms satisfaction/reputation score? › Anonymous statistics in how other users have responded in similar cases? › What is the role of incentives and tokenization? I.e. artificial intelligence or third party experts explaining me the contract terms, risks and consequences of approval in layman’s terms? › What is the role of gamification? › Self-sovereign: my wallet of consent? › Taxonomy for approval contracts? The use of Linked data? › Paving the way for automated decision making? › Dare to experiment! 38
  29. 29. DigiAkkoord – approval application 39 Innovation project “DigiAkkoord” at department of Justice and Security, release somewhere in 2019; Focuses on a re-usable application for all approval processes within the government; DigiAkkoord is not really a protocol but a business building block; Challenge has more global perspective and more emphasis on protocol development compared to DigiAkkoord;
  30. 30. Any questions? Email: f.bakker@minfin.nl
  31. 31. Dave de Fijter IOTA Foundation Extra support of IOTA for Challenge 1
  32. 32. Dave de Fijter Developer Advocate dave.defijter@iota.org @fijter IOTA Foundation www.iota.org @iotatoken
  33. 33. What is IOTA / the IOTA foundation?
  34. 34. The IOTA Protocol Highly Scalable Zero-fee transactions Low resource requirements Secure data transfer Quantum Immune A permissionless decentralised and self-regulating P2P network Overcoming the limitations of Blockchain
  35. 35. Blockchain Scaling Issues Slow Confirmations Expensive Fees Consensus Bottleneck
  36. 36. More activity More validation = The Tangle
  37. 37. Donations of $100M+ to date Hubs in Berlin, Tel Aviv, Oslo, Taipei More than 80 employees around the globe Ecosystem of more than 100 entities > 70k active community members > 120k content followers Ecosystem Development Fund $13M+ in funding nearly $100k awarded to date A global Foundation, based in Berlin
  38. 38. Creating a government backed protocol for digital permissions Using IOTA technology
  39. 39. Why IOTA? - Scalable - No fees, no hassle - Data transactions supported - Lightweight - Open source and permissionless - Quantum immune, ready for the future
  40. 40. IOTA Networks Due to the nature of IOTA, you are able to send transactions on the Mainnet without fees. This lets you publish transactions with data directly on the Mainnet for no cost. However, it is best to use the Devnet to build Proof of Concept applications. This network is run by the IOTA Foundation for developer to use and test on as they please. We also have a Faucet which dispenses tokens for use on the Devnet. We also have a Spamnet for testing the protocols resilience to high TPS. The configuration of the `Devnet`
  41. 41. Client Libraries ● Typescript/Javascript library ● Go and Java libraries ● C libraries (Entangled, WIP) ● Python and C++ #development
  42. 42. Masked Authenticated Messaging (MAM) ● Secure message streams over the tangle ● Feeless messages ● Currently Javascript/Typescript only ● New C-based implementation in the works ● Both public and private messages possible #mam
  43. 43. ??? ???????? ???? ???? ???????????? 2nd Layer libraries like MAM do not require protocol changes or hardforks, they can be built and supported by anyone to ensure that IOTA fits their needs. ???????? ? ???
  44. 44. Documentation #documentation https://docs.iota.org New documentation portal available now
  45. 45. Relevant projects done with IOTA ● TangleID project (https://tangleid.github.io) ● Digital identity Proof of concept by VX Company #development
  46. 46. What will the IOTA Foundation provide We will be there with 2 coaches (Jedi’s) to support teams working with IOTA Content packages and support for teams will be available before and during the hackathon We will publicly communicate about the event and the participating projects before, during and after the hackathon #odyssey-hackathon on Discord #odyssey-hackathon
  47. 47. Links IOTA Foundation https://www.iota.org Discord https://discordapp.com/invite/jAzz6Uv Documentation https://docs.iota.org YouTube http://www.youtube.com/c/iotafoundation Odyssey Hackathon https://www.odyssey.org
  48. 48. Questions?
  49. 49. Dave de Fijter Developer Advocate dave.defijter@iota.org @fijter IOTA Foundation www.iota.org @iotatoken Thank You
  50. 50. COFFEE BREAK AND EARLY LUNCH in the Basement
  51. 51. Geerten Verweij Dutch Chamber of Commerce’s Innovation Lab Challenge 2 by Dutch Chamber of Commerce Becoming an oracle in the Digital Infrastructure of a Nation
  52. 52. Odyssey 2019 Digital Nation’s Infrastructure Deepdive Dutch Chamber of Commerce
  53. 53. What is the Dutch Chamber of Commerce all about?
  54. 54. Our Mission • Making live easier for entrepreneurs • Provide useful information • Provide useful data
  55. 55. Our Actions • Registering businesses in the trade register • Providing information from the trade register • Being a guide and advisor for entrepreneurs
  56. 56. Trade Register • Registering your business Become legit • Look up other businesses See if they are legit • Create trust and certainty We are both legit, let’s do business!
  57. 57. Our crown jewel • A piece of paper, possibly in PDF • Used a lot by all entrepreneurs and businesses in the Netherlands • Might not be high-tech by today’s standards
  58. 58. Let us innovate!
  59. 59. Digital Identity
  60. 60. Digital Identity • Available for your personal identity • Not yet available for your business identity • We have an experimental version
  61. 61. Digital Identity
  62. 62. Digital Identity
  63. 63. Digital Identity
  64. 64. Digital Identity
  65. 65. Digital Identity • Protect your personal identity by using your business identity through the KVK • The KVK is the Oracle for business entities • Next step: integrating these concepts into the Digital Nations Infrastructure.. Trusted Digital Business Identity
  66. 66. Digital Identity How do we challenge you? Build innovative solutions that help entrepreneurs be in control of their identity. Or even better: help entrepreneurs succeed in conducting business using their online identity using these experimental new features.
  67. 67. For example: Flash Company • Smart contract • One-off collaboration • Backed by KVK verified business identity
  68. 68. Datamining and AI
  69. 69. Datamining and AI • KVK has plenty of data • What can we learn from this data?
  70. 70. Datamining and AI Existing experiments at the KVK: • Success Prediction • Fraud Detection What else is possible? • Anomaly detection? • Clustering? • Surprise us!
  71. 71. Hackathon Data
  72. 72. Available KVK data at the Odyssey hackathon • Anomanized trade register data with Swagger UI • Experimental Identity app
  73. 73. API • Anomanized data • Large volume (~3M) • Clear Swagger description • Search by KVK-number • Search by trade name • Search by city
  74. 74. Identity App • Mobile apps included • Developers guide
  75. 75. Question? • Manon van Brakel-Gobels manon.van.brakel-gobels@kvk.nl • Ben Schuttenbeld ben.schuttenbeld@kvk.nl
  76. 76. Nick Apeldoorn ICT Architect at Kadaster Challenge 3 by Kadaster Building a Distributed Data Ecosystem
  77. 77. Building wallet Building a Distributed Data Ecosystem
  78. 78. Kadaster  Providing legal certainty about ownership and transactions of real estate.  Managing nationwide geographic datasets and acting as consultant.
  79. 79. We need to keep up!
  80. 80. Demands for housing
  81. 81. Societal challenges
  82. 82. Building wallet  Digitization of the built environment.  Making all information on real objects readily available for authorized persons and machines.  Distributed data ecosystem: distributed ledger as backbone.  Validating information and the parties adding and accessing the data.  Ensuring privacy.  Solution at the protocol level.
  83. 83. Research questions  How to include existing standards, e.g. BIM?  How to tie existing solutions / applications and data sources into the ecosystem?  How to manage access to (private or commercially sensitive) data in this distributed environment?  How to engage data owners to contribute data to the building wallet?  How to govern this public-private infrastructure in an effective and responsible way?
  84. 84. Toolkit  Open geographic datasets.  A transaction and ownership database for real estate.  The Proof of Concept built last year.  A relevant network: Kadaster, Dutch Ministery of the Interior, building companies.
  85. 85. Contact Nick van Apeldoorn – ICT Architect Kadaster – Emerging Technology Center Nick.vanApeldoorn@kadaster.nl +316 52 48 19 06
  86. 86. End of Plenary Program - Time to Connect REGISTER TODAY AT THE ODYSSEY STAND!