SlideShare une entreprise Scribd logo
1  sur  64
Could human-driven approach revolutionize our
use of data?
House rules:
1. Questions to Skype chat
2. Slides will be published
3. Be active
Future vision from Sitra
Agenda
What is the IHAN ® project on human-driven data economy about?
Jaana Sinipuro (15min)
What does IHAN® change?
Antti Larsio (15min)
What are the IHAN® technical specifications?
Jyrki Suokas (15 min)
IHAN® and industry pilot approach
Jyrki Suokas (5 min)
How is IHAN® project proceeded?
Juhani Luoma-Kyyny (20min)
What does IHAN® Standardisation (Cen-Cenelec) process mean?
Markus Kalliola (10min)
Questions and Answers
Everybody (20min)
Next steps
5 min
Webinar ends
5 key facts about Sitra
1. A gift from Parliament to the 50-year-old
Finland.
2. An independent foresight agency:
futurologist, researcher, visionary,
developer, experimentalist, partner, trainer,
networker.
3. Funded by returns on endowment capital
and capital investments.
4. Envisages Finland as a successful pioneer in
sustainable well-being.
5. Its vision is supported by three themes, six
focus areas and dozens of projects.
+1
Building our future
together
What is the IHAN® project on human-driven data
economy about?
Jaana Sinipuro (15min)
Who creates the data in the future?
19901980 2015
Well-beingandtheeconomy
2000
Data collected by individuals /
unregulated data
Data collected by professionals /
regulated data
A H I S T O R I C C H A N G E
Trust
A H I S T O R I C C H A N G E
From storing data to sharing data (human-driven control)
A H I S T O R I C C H A N G E
The momentum is right now…
#GDPR
General Data Protection Regulation
#PSD2Payment Services Directive
#EIDASEU regulation on electronic
identification and trust services for
electronic transactions
EU strategies in support
# Digital single Market
Free flow of non-personal data
# European Data Economy
Data is an essential resource for economic growth
# Digitising European Industry
The Internet of Things (IoT), cloud computing, big data and data analytics,
robotics and 3D printing
GDPR Article 20 : Right to data portability
Current regulation is a good start, but even with Article 29
Working party clarifications*, it does not define the
format, governance nor method for personal data sharing
in our real-time, many-to-many world
“structured, commonly used and machine-readable format” needs to
be unambiguously and explicitly defined for personal data across all
industries so automated data interchange is possible
“… personal data transmitted directly from one controller to
another, where technically feasible. ” protocols for real-time transfer
of information do not exist and thus need to be created
“the data subject has given consent to the processing of his or her
personal data for one or more specific purposes; ” individuals do not
have a way to manage their consents across data processors
* http://ec.europa.eu/newsroom/document.cfm?doc_id=44099https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG
GDPR 2.0
Logical conclusion
A H I S T O R I C C H A N G E
IHAN®?
IHAN®
Our project aims to create an international
protocol that gives people control over how and
what their data is being used for.
Think of it as a kind of IBAN (International
Bank Account Number) for personal data.
I N T E R N A T I O N A L
H U M A N S ’ A C C O U N T
N E T W O R K
Establish key principles, rules & guidelines for human-driven
Data exchange Platform. Build awareness and engage people
across Europe
Test, develop and scale Platform to multiple industries and EU
countries. Ensure interoperability through technology Proof-
of-Concepts [ I H A N ® A P P R O V E D ]
Branding. Develop common Roadmap for fair Data exchange
Method. Build Common Governance Model [ I H A N ® A P P R O V E D ]
Our project in nutshell
What does IHAN® change?
what is the current situation and our target goal?
Antti Larsio (15min)
Data collectors
Current situation
Data about me is somewhere out there
I have to manage a lot of different accounts
I have to manually copy my data between service providers
Data about
me
Data collectors
Data collectors
Data collectors
Current situation - trend
Data companies have the data about people
I have to buy data from data companies – or die
Data companies will control service industries and me
Data about
me
Data collectors
Data collectors
How to get data for my services?
€ / £ / $
€ / £ / $
Data collectorsRisk
Data companies will control the whole service industry
There is an unfair cost to get data
Monopoly will decrease innovation
Extra cost for me and control of innovations
Data about
me
Data collectors
Data collectors
€
€
€
€
€
Data collectors
IHAN® future
Data about me is somewhere out there - but I do know where and what
It needs my authorization to use my data – I’m empowered
My data can be gathered for my service on fair and reasonable terms
Services will focus on value, quality and need – data is available by my consent
Data about
me
Data collectors
Data
collectors
LOG
Authorization
Service discovery
Identifier wallet
APIs
Metadata exhange
Data transfer
Protocol for data requests
IHAN® in a nutshell
Service Data
Authorization
to use
my data
Service provider
Requests for data
Data providers
What are IHAN® technical specifications?
How does IHAN® architecture and technology principles look like?
Jyrki Suokas (15min)
Identity
Data
Consent
Services
Log
End User Services and IHAN® services
End user-
Service
Data
Service provider Data providerEnd user
ServicesIHAN
Service provider Data providerEnd user
IHAN® Services components
End User Service Provider Data Provider
Identity
Data
Consent
Services
Log
Wallet of identifiers
Master Service Directory
End User Service Directory Service Provider Service Directory
End User Data Directory Data Provider Data DirectoryService Provider Data Directory
Service Order Data OrderConsent Directory
End User Logs Data Provider LogsService Provider Logs
IHAN® Technical Specification –
Document about WHAT, not HOW
- Contains documentation of all functional and non-
functional requirements for IHAN® service layer
- Architectural diagrams of components and data
flows for reference architecture
- Technical specification of IHAN® service messages
on field level
- IHAN® service documentation and how actual
services will use IHAN® services
- Governance
– Initially created by Sitra project team
– Maintained centrally by Sitra project team
– Updated through learnings from IHAN® pilots
- Initial version available 31.8.2018
IHAN® and industry pilot approach
What kind of support can service pilots expect
Jyrki Suokas ( 5 min)
Networks, industry expertise and business
development
- Sitra team can support Service projects with
industry expertise and networking cross-
pollination though our advisors
- ”IHAN® project starter kit” with easy to use tools
and templates to document and validate the new
service
Risto Tornivaara
Former CEO of
Danske Bank Finland
Hannu Hämäläinen
Former Ministerial adviser
at Finnish Ministry of
Social Affairs and Health
Antti Larsio
Former National Technology
Officer Microsoft / HUS CIO /
Telia IT Corporate Director
How is IHAN® project proceeded?
What kind of working methodology, tools and process will be used?
Juhani Luoma-Kyyny ( 20 min)
End User Services and IHAN® services
End user-
Service
Data
Service provider Data providerEnd user
ServicesIHAN
Service provider Data providerEnd user
Identity
Data
Consent
Services
Log
IHAN® technical component documentation
End User Service Provider Data Provider
Identity
Data
Consent
Services
Log
Wallet of identifiers
Master Service Directory
End User Service Directory Service Provider Service Directory
End User Data Directory Data Provider Data DirectoryService Provider Data Directory
Service Order Data OrderConsent Directory
End User Logs Data Provider LogsService Provider Logs
Pilot Project 1 creates initial components and
services
End User Service Provider Data Provider
Identity
Data
Consent
Services
Log
Wallet of identifiers
Master Service Directory
End User Service Directory Service Provider Service Directory
End User Data Directory Data Provider Data DirectoryService Provider Data Directory
Service Order Data OrderConsent Directory
End User Logs Data Provider LogsService Provider Logs
Pilot Project 2 adds new and creates alternative
components. More IHAN® services added
End User Service Provider Data Provider
Identity
Data
Consent
Services
Log
Wallet of identifiers
Master Service Directory
End User Service Directory Service Provider Service Directory
End User Data Directory Data Provider Data DirectoryService Provider Data Directory
Service Order Data OrderConsent Directory
End User Logs Data Provider LogsService Provider Logs
Wallet of identifiers
End User Logs
Pilot Project 3 adds yet new components. More
services to IHAN® layer
End User Service Provider Data Provider
Identity
Data
Consent
Services
Log
Wallet of identifiers
Master Service Directory
End User Service Directory Service Provider Service Directory
End User Data Directory Data Provider Data DirectoryService Provider Data Directory
Service Order Data OrderConsent Directory
End User Logs Data Provider LogsService Provider Logs
Wallet of identifiers
End User Logs
Pilot Project n adds new and creates alternative
components. IHAN® Service layer complete
End User Service Provider Data Provider
Identity
Data
Consent
Services
Log
Wallet of identifiers
Master Service Directory
End User Service Directory Service Provider Service Directory
End User Data Directory Data Provider Data DirectoryService Provider Data Directory
Service Order Data OrderConsent Directory
End User Logs Data Provider LogsService Provider Logs
Wallet of identifiers
End User Logs
Data Provider Data DirectoryService Provider Data Directory
IHAN® architecture implementations
Collection of IHAN
reference
architectures
FOR IHAN® PILOT PROJECTS WE
ARE SEEKING EITHER ALREADY
ONGOING PROJECTS OR
PROJECTS THAT ARE
READY FOR A QUICK LAUNCH.
Pilot project criteria
1. Applicants: we are particularly seeking the kind of
applicants operating in co-operation networks that
involve various actors.
2. Implementation phase of the project: we are
looking for applicants belonging to already existing
ecosystems, with whom we can advance quickly.
3. User-oriented approach: the clear aim of the pilot
project is to improve people’s everyday lives and
opportunities for the management of their own
information.
4. Technical solution: the pilot project needs to solve
technical software component issues related to
IHAN® principles, specified more closely in the
application form.
5. Effectiveness: the pilot project aims to replace the
current operating model, where an individual’s
information is dispersed in the depths of various data
storages owned by different systems and companies,
with a human-oriented and fair exchange of data.
6. Visionary approach: the pilot project is aimed at
the future and has a “novelty value”.
7. Feasibility: the applicant must have sufficient
competence and, if necessary, a functioning
subcontractor network for the development, launch
and establishment of a feasible and economically
sound solution.
8. Repeatability: the lessons learned from the pilot
project and feasible solutions should also be able to be
used in other sectors and scaled up.
9. Continuity: the application demonstrates the
applicant’s strong commitment, resources and plans
for the continuation of the operations after the project
is over.
10. Transfer of intellectual property rights: the
applicant is prepared to transfer intellectual property
rights to the extent required by the pilot project, for
example, in connection with the EU-wide workshops.
11. Other criteria: in addition to the criteria listed
above, the pilot project meets the technical and other
similar criteria to be specified in the application form.
The stages of the call for funding applications
The applicant fills in the application form and submits the application from to Sitra
at the email address ihan@sitra.fi.
Meeting with Sitra and the applicant selected to continue the process for further
discussions (goals, schedule, resources) about the potential funding
Sitra will evaluate which projects it will fund based on the application form and the
common discussion.
Those selected to continue the process will prepare a specified project plan serve as
a basis for the funding agreements between Sitra and the applicants
5
.
2
3
1
4
MORE INFO:
WWW.SITRA.FI/IHAN
IHAN® Standardisation
What does (Cen-Cenelec) process mean? What will we standardise?
Markus Kalliola (10min)
®
Regulation vs. standardisation
- GDPR gives citizens new rights
– To have a copy of their data in an electronic format
– To transfer data from one service provider to another
– To have right to be forgotten
- GPDR doesn’t say how these new rights need to be implemented
- Standarisation is a process of developing compatible technologies and processes
- Multiple standards can exists to implement similar job
– Picture standards JPG, GIF, PNG etc.
– IHAN technical standard will be one standard among others to implement GDPR rights and other
necessary processes to make human driven data economy possible
CEN-CENELEC standardisation processes
- CEN-CENELEC
– European Standards (EN), European level, weighted vote
– Example: EN 14484:2003 Health informatics - International transfer of personal health data covered by the EU
data protection directive
– Harmonization Document (HD), three languages, replaces national standards
– Technical Specification (TS), National level, replaces national standards
– Amendment to EN/HD
– Technical Report (TR), done by a official Technical body, vote by simple majority
– Guide, made by CEN member, vote by simple majority
– Workshop Agreement (CWA)
- ISO
– Vienna agreement (1991) between ISO and CEN-CENELEC
IHAN® workshop
– Why CEN-CENELEC workshop?
– International co-operation
– Open process
– Credibility in EU
– Kick off meeting October
– A year long process
– Work Items
– Work Item 0: Coordination
– Work Item 1: Principles, architecture and requirements
– Work Item 2: Identity and Data identifiers
– Work Item 3: Orders and messages
– Work Item 4: Distributed Log system
– Work Item 5: Smart contract structure
Next steps
Jyrki Suokas ( 5 min)
Making
people’s life
easier, smarter
and happier!
Appendix
Main building blocks
Trust domains Trust domains
1 2
3
4
5
6
7
7
7
9
8
1
0
1
0
Wallet of identifiers
Authentication
- Collaboration with existing
authentication solutions and
development work
- Strong authentication
- Two factor authentication
- Dezentralized authentication
- OAuth, OpenID, OpenID Connect
- Distributed Ledger Technology
- FIDO, UAF, U2F
Uniform Resource Indentifier, Uniform
Resource Locator
- IHAN number
- Data
- Credentials
Wallet
- Various authentication mechanism
- Various URI/URL of data
- Credentials
- Combination of an individual and URI of
data = IHAN number?
- Cryptography
- Interfaces, protocols, APIs
1
Identifiers
Data object (a person)
Legitime data possessor
Legitime service provider
Individual / physical entity
Organization
Identity verified by a trusted 3rd party
Application
Web address
Identity known by a mutual agreement,
but not verified by 3rd party
Identity unknown to external parties,
known only by me
Data about data object
Device
privateID
agreedID
verifiedID
organizationID
applicationID
urlID
deviceID
dataID
IHAN number
(( privateID agreedID verifiedID) dataID ))
f
Generates asymmetric key-pair: Master key and Private key
Master key known to both parties
Private key known only by a person (data object)
Data object can prove the relationship to the data by using IHAN number
URI = scheme:[//authority]path[?query][#fragment]
authority = [userinfo@]host[:port]
Wallet of identifiers
(( privateID agreedID verifiedID) dataID ))
f
Secure collection of IHAN numbers
organizationID
applicationID
urlID
deviceID
Each connected to relevant dataID URI = scheme:[//authority]path[?query][#fragment]
primary access mechanism network location
Wallet of identifiers
MyWallet key
- Biometric
- Hardware
- Secured seed
- IHAN foundation secured blockchain secured hash
- Deterministic wallet
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
One ”card” per data possessor
or service provider
MyID may be verified, agreed or privateIHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
IHAN number (MyID and dataID)
Master key
Private key (encrypted by MyWallet key)
Service description
Data description
Service provider
Data provider
Metadata
Other
Authorization
- Content
- Metadata structure and process
- Encryption
- PKI
- IKE (Internet Key Exchange)
- Chained authorization
- Protocols
- APIs
- Log messages
2
Authorization
Data object (a person)
Legitime data possessor Auhorization to use data
(IHANAuth)
Legitime data possessor
New legitime data possessorLegitime service provider
New legitime service provider
If they have rights to give
an authorization
Data transfer
Metadata
Data about data
Wallet of
identifiers
Metadata: link
Data possessor
Used standard
XML - desciption
Metadata - interoperability
Data about data
Data possessor
A
Used standard
XML - desciption
Data possessor
B
Used standard
XML - desciption
Service provider
Based on metadata desciptions from both data
possessor solving the interoperability and usage
of data in order to provide services
Service Directory
- Personal Service Directory
– Contains list of service user currently is using or has used before
– If user opt-in/ shows intrest for new services (limited set) this allows service providers to propose new services in user’s Personal
Service Directory. Only services that are possible are shown - Service discovery by user based on his/her current metadata of user
data and what data of the user is accessible.
- Master Service Directory
– Service providers publish their services and describe what data of the user and what data from data sources is needed for the service
to be created
– Service discovery by user based on availability of users’ current metadata and data needed by services.
- Service Provider Directory
– Contains list of services users currently are using or have used before. Consent information and access mechanism to Data sources
- iOS, Windows, Android
- IE, Chrome, Mozilla, …
- APIs
- UI
- Use cases
- Similarity w X-Road
3
Registration
- Registration for service
– When user gives order for service provider to connect to one or more data sources the service provider
sends the consent related GDPR messages to data sources on behalf of the user
– Order can be time limited
– When user orders a service this triggers creation of
– Identifiers
– Service directory entry into Personal Service Directory and Service Provider Directory
– Basic authorization
– Terms of usage
- Content
- GDPR message
- API
4
Routing
- Focus on Internet messages and data transportation
- Authorization
- Data
- Blockchain
8
Routing (to be defined)
HTTPS
TLS
Log messages
Wallet of identifiers - seed
Permissioned blockchain – seed
Permissioned blockchain – MyLog hash
Provate blockchain - Mylog
Data management Console
- Functionality
- UI
- Security
- Use cases
- APIs
9
Data Management Console
Wallet of identifiers
UI forWallet of
identifiers
UI forWallet of
Logs
UI for
Authorization
messages
MyLog
Web communication
architecture, Interfaces, APIs
- Registration
- Authorization
- Data requests
- Data send, receive, (REST…)
- Service directory
- Trust domains
- Data management console
- Log
- Data transportation
- Wallet of identifiers
10
sitra.fi | seuraavaerä.fi
@sitrafund

Contenu connexe

Tendances

Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Matt Stubbs
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
ijtsrd
 
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
Data IQ Argentina
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks
Francisco Calzado
 

Tendances (20)

The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
 
CCC-Internet of Things Foundation
CCC-Internet of Things FoundationCCC-Internet of Things Foundation
CCC-Internet of Things Foundation
 
How Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT AnalyticsHow Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT Analytics
 
Bhadale group of companies - research-oriented - multidisciplinary blended s...
Bhadale group of companies  - research-oriented - multidisciplinary blended s...Bhadale group of companies  - research-oriented - multidisciplinary blended s...
Bhadale group of companies - research-oriented - multidisciplinary blended s...
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
 
Bhadale group of companies service catalogue
Bhadale group of companies  service catalogueBhadale group of companies  service catalogue
Bhadale group of companies service catalogue
 
Operationalize analytics through modern data strategy
Operationalize analytics through modern data strategyOperationalize analytics through modern data strategy
Operationalize analytics through modern data strategy
 
Data-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital TransformationData-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital Transformation
 
Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311Truzzt whitepaper a4_einzel_20200311
Truzzt whitepaper a4_einzel_20200311
 
Deep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of ThingsDeep Learning Approaches for Information Centric Network and Internet of Things
Deep Learning Approaches for Information Centric Network and Internet of Things
 
Docker Summit MongoDB - Data Democratization
Docker Summit MongoDB - Data Democratization Docker Summit MongoDB - Data Democratization
Docker Summit MongoDB - Data Democratization
 
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
¿Cómo puede ayudarlo Qlik a descubrir más valor en sus datos de IoT?
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
 
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...CCPA Webinar:  Amendments, Proposed Regulations, New Ballot Initiative, and R...
CCPA Webinar: Amendments, Proposed Regulations, New Ballot Initiative, and R...
 
Etiya White Paper_ABDR
Etiya White Paper_ABDREtiya White Paper_ABDR
Etiya White Paper_ABDR
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks201306 CIO NET The Value of IT Frameworks
201306 CIO NET The Value of IT Frameworks
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Blockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and AdoptionBlockchain for Power Utilities: A View on Capabilities and Adoption
Blockchain for Power Utilities: A View on Capabilities and Adoption
 

Similaire à What is IHAN® project all about in technical matter?

Industrial internet big data german market study
Industrial internet big data german market studyIndustrial internet big data german market study
Industrial internet big data german market study
Business Finland
 
hurwitz-whitepaper-essential-elements-of-iot-core-platform
hurwitz-whitepaper-essential-elements-of-iot-core-platformhurwitz-whitepaper-essential-elements-of-iot-core-platform
hurwitz-whitepaper-essential-elements-of-iot-core-platform
Ingrid Fernandez, PhD
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
IBM Danmark
 
enterprise arch_prc_short
enterprise arch_prc_shortenterprise arch_prc_short
enterprise arch_prc_short
Cora Carmody
 
Loving_HowToDrive-ValuA7A3B4
Loving_HowToDrive-ValuA7A3B4Loving_HowToDrive-ValuA7A3B4
Loving_HowToDrive-ValuA7A3B4
Steven Loving
 
Nexthink_it_operations_white_paper
Nexthink_it_operations_white_paperNexthink_it_operations_white_paper
Nexthink_it_operations_white_paper
Christel Gunnarson
 

Similaire à What is IHAN® project all about in technical matter? (20)

Oracle Digital Business Transformation and Internet of Things by Ermin Prašović
Oracle Digital Business Transformation and Internet of Things by Ermin PrašovićOracle Digital Business Transformation and Internet of Things by Ermin Prašović
Oracle Digital Business Transformation and Internet of Things by Ermin Prašović
 
Confluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPointConfluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPoint
 
IoT-Use-Case-eBook
IoT-Use-Case-eBookIoT-Use-Case-eBook
IoT-Use-Case-eBook
 
Industrial internet big data german market study
Industrial internet big data german market studyIndustrial internet big data german market study
Industrial internet big data german market study
 
Industrial internet big data german market study
Industrial internet big data german market studyIndustrial internet big data german market study
Industrial internet big data german market study
 
Israel IT Market 2007-2009
Israel IT  Market 2007-2009Israel IT  Market 2007-2009
Israel IT Market 2007-2009
 
Ihan webinar 281019
Ihan webinar 281019Ihan webinar 281019
Ihan webinar 281019
 
hurwitz-whitepaper-essential-elements-of-iot-core-platform
hurwitz-whitepaper-essential-elements-of-iot-core-platformhurwitz-whitepaper-essential-elements-of-iot-core-platform
hurwitz-whitepaper-essential-elements-of-iot-core-platform
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
Identity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth MayIdentity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth May
 
Introduction To Butler Group's Premier Information Support & Advisory Service
Introduction To Butler Group's Premier Information Support & Advisory ServiceIntroduction To Butler Group's Premier Information Support & Advisory Service
Introduction To Butler Group's Premier Information Support & Advisory Service
 
IoT Implementation and Security Best Practices
IoT Implementation and Security Best PracticesIoT Implementation and Security Best Practices
IoT Implementation and Security Best Practices
 
Driving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected WorldDriving Networks Forward to the Hyper-Connected World
Driving Networks Forward to the Hyper-Connected World
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
enterprise arch_prc_short
enterprise arch_prc_shortenterprise arch_prc_short
enterprise arch_prc_short
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
 
Loving_HowToDrive-ValuA7A3B4
Loving_HowToDrive-ValuA7A3B4Loving_HowToDrive-ValuA7A3B4
Loving_HowToDrive-ValuA7A3B4
 
Nexthink_it_operations_white_paper
Nexthink_it_operations_white_paperNexthink_it_operations_white_paper
Nexthink_it_operations_white_paper
 

Plus de Sitra the Finnish Innovation Fund

Plus de Sitra the Finnish Innovation Fund (20)

Reilun datatalouden tahtotila.pptx
Reilun datatalouden tahtotila.pptxReilun datatalouden tahtotila.pptx
Reilun datatalouden tahtotila.pptx
 
Esitysmateriaali Millä suosituksilla? Kohti elinikäisen oppimisen Suomea -sel...
Esitysmateriaali Millä suosituksilla? Kohti elinikäisen oppimisen Suomea -sel...Esitysmateriaali Millä suosituksilla? Kohti elinikäisen oppimisen Suomea -sel...
Esitysmateriaali Millä suosituksilla? Kohti elinikäisen oppimisen Suomea -sel...
 
Esitysmateriaali Miten osaajat liikkuvat alueilla 27.10.2021
Esitysmateriaali Miten osaajat liikkuvat alueilla 27.10.2021Esitysmateriaali Miten osaajat liikkuvat alueilla 27.10.2021
Esitysmateriaali Miten osaajat liikkuvat alueilla 27.10.2021
 
Kuntamarkkinat tietoisku 16.9.2021: Sitran vuorovaikutteisen tilannekuvan toi...
Kuntamarkkinat tietoisku 16.9.2021: Sitran vuorovaikutteisen tilannekuvan toi...Kuntamarkkinat tietoisku 16.9.2021: Sitran vuorovaikutteisen tilannekuvan toi...
Kuntamarkkinat tietoisku 16.9.2021: Sitran vuorovaikutteisen tilannekuvan toi...
 
6.9.2021 esitysmateriaali miten työssä ja vapaa ajalla kertyvä osaaminen saad...
6.9.2021 esitysmateriaali miten työssä ja vapaa ajalla kertyvä osaaminen saad...6.9.2021 esitysmateriaali miten työssä ja vapaa ajalla kertyvä osaaminen saad...
6.9.2021 esitysmateriaali miten työssä ja vapaa ajalla kertyvä osaaminen saad...
 
Saa osaamisesi näkyviin -esitysmateriaali 30.8.21
Saa osaamisesi näkyviin -esitysmateriaali 30.8.21Saa osaamisesi näkyviin -esitysmateriaali 30.8.21
Saa osaamisesi näkyviin -esitysmateriaali 30.8.21
 
Esitysmateriaali Yhteislähtö osaaminen näkyviin -viikoille
Esitysmateriaali Yhteislähtö osaaminen näkyviin  -viikoilleEsitysmateriaali Yhteislähtö osaaminen näkyviin  -viikoille
Esitysmateriaali Yhteislähtö osaaminen näkyviin -viikoille
 
Esitysmateriaali perehdytys erätauko dialogiin osaamisen huomaamisesta
Esitysmateriaali perehdytys erätauko dialogiin osaamisen huomaamisestaEsitysmateriaali perehdytys erätauko dialogiin osaamisen huomaamisesta
Esitysmateriaali perehdytys erätauko dialogiin osaamisen huomaamisesta
 
Perehdytys Erätauko-dialogiin osaamisen huomaamisesta 18.8.2021
Perehdytys Erätauko-dialogiin osaamisen huomaamisesta 18.8.2021Perehdytys Erätauko-dialogiin osaamisen huomaamisesta 18.8.2021
Perehdytys Erätauko-dialogiin osaamisen huomaamisesta 18.8.2021
 
Ylä-Savon tilannekuvan julkistus 1606211
Ylä-Savon tilannekuvan julkistus 1606211Ylä-Savon tilannekuvan julkistus 1606211
Ylä-Savon tilannekuvan julkistus 1606211
 
Varsinais-Suomen tilannekuvan julkistus 1606211
Varsinais-Suomen tilannekuvan julkistus 1606211Varsinais-Suomen tilannekuvan julkistus 1606211
Varsinais-Suomen tilannekuvan julkistus 1606211
 
Seinäjoen ja ilmajoen tilannekuvan julkistus 160621
Seinäjoen ja ilmajoen tilannekuvan julkistus 160621Seinäjoen ja ilmajoen tilannekuvan julkistus 160621
Seinäjoen ja ilmajoen tilannekuvan julkistus 160621
 
Raahen seudun tilannekuvan julkistus 160621
Raahen seudun tilannekuvan julkistus 160621Raahen seudun tilannekuvan julkistus 160621
Raahen seudun tilannekuvan julkistus 160621
 
Pirkanmaan tilannekuvan julkistus 1606211
Pirkanmaan tilannekuvan julkistus 1606211Pirkanmaan tilannekuvan julkistus 1606211
Pirkanmaan tilannekuvan julkistus 1606211
 
Lapin tilannekuvan julkistus 1606211
Lapin tilannekuvan julkistus 1606211Lapin tilannekuvan julkistus 1606211
Lapin tilannekuvan julkistus 1606211
 
Hämeenlinnan tilannekuvan julkistus 1606211
Hämeenlinnan tilannekuvan julkistus 1606211Hämeenlinnan tilannekuvan julkistus 1606211
Hämeenlinnan tilannekuvan julkistus 1606211
 
Etelä-Savon tilannekuvan julkistus 1606211
Etelä-Savon tilannekuvan julkistus 1606211Etelä-Savon tilannekuvan julkistus 1606211
Etelä-Savon tilannekuvan julkistus 1606211
 
Kainuun tilannekuvan julkistus 1606211
Kainuun tilannekuvan julkistus 1606211Kainuun tilannekuvan julkistus 1606211
Kainuun tilannekuvan julkistus 1606211
 
Alueiden osaamisen aika foorumi 160621
Alueiden osaamisen aika foorumi 160621Alueiden osaamisen aika foorumi 160621
Alueiden osaamisen aika foorumi 160621
 
5.5.2021: Portfolios for system transformation by Giulio Quaggiotto (UNDP)
5.5.2021: Portfolios for system transformation by Giulio Quaggiotto (UNDP)5.5.2021: Portfolios for system transformation by Giulio Quaggiotto (UNDP)
5.5.2021: Portfolios for system transformation by Giulio Quaggiotto (UNDP)
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

What is IHAN® project all about in technical matter?

  • 1. Could human-driven approach revolutionize our use of data? House rules: 1. Questions to Skype chat 2. Slides will be published 3. Be active Future vision from Sitra
  • 2. Agenda What is the IHAN ® project on human-driven data economy about? Jaana Sinipuro (15min) What does IHAN® change? Antti Larsio (15min) What are the IHAN® technical specifications? Jyrki Suokas (15 min) IHAN® and industry pilot approach Jyrki Suokas (5 min) How is IHAN® project proceeded? Juhani Luoma-Kyyny (20min) What does IHAN® Standardisation (Cen-Cenelec) process mean? Markus Kalliola (10min) Questions and Answers Everybody (20min) Next steps 5 min Webinar ends
  • 3. 5 key facts about Sitra 1. A gift from Parliament to the 50-year-old Finland. 2. An independent foresight agency: futurologist, researcher, visionary, developer, experimentalist, partner, trainer, networker. 3. Funded by returns on endowment capital and capital investments. 4. Envisages Finland as a successful pioneer in sustainable well-being. 5. Its vision is supported by three themes, six focus areas and dozens of projects. +1 Building our future together
  • 4. What is the IHAN® project on human-driven data economy about? Jaana Sinipuro (15min)
  • 5. Who creates the data in the future? 19901980 2015 Well-beingandtheeconomy 2000 Data collected by individuals / unregulated data Data collected by professionals / regulated data A H I S T O R I C C H A N G E
  • 6. Trust A H I S T O R I C C H A N G E
  • 7. From storing data to sharing data (human-driven control) A H I S T O R I C C H A N G E
  • 8. The momentum is right now… #GDPR General Data Protection Regulation #PSD2Payment Services Directive #EIDASEU regulation on electronic identification and trust services for electronic transactions
  • 9. EU strategies in support # Digital single Market Free flow of non-personal data # European Data Economy Data is an essential resource for economic growth # Digitising European Industry The Internet of Things (IoT), cloud computing, big data and data analytics, robotics and 3D printing
  • 10.
  • 11. GDPR Article 20 : Right to data portability Current regulation is a good start, but even with Article 29 Working party clarifications*, it does not define the format, governance nor method for personal data sharing in our real-time, many-to-many world “structured, commonly used and machine-readable format” needs to be unambiguously and explicitly defined for personal data across all industries so automated data interchange is possible “… personal data transmitted directly from one controller to another, where technically feasible. ” protocols for real-time transfer of information do not exist and thus need to be created “the data subject has given consent to the processing of his or her personal data for one or more specific purposes; ” individuals do not have a way to manage their consents across data processors * http://ec.europa.eu/newsroom/document.cfm?doc_id=44099https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG
  • 12. GDPR 2.0 Logical conclusion A H I S T O R I C C H A N G E
  • 14. IHAN® Our project aims to create an international protocol that gives people control over how and what their data is being used for. Think of it as a kind of IBAN (International Bank Account Number) for personal data. I N T E R N A T I O N A L H U M A N S ’ A C C O U N T N E T W O R K
  • 15. Establish key principles, rules & guidelines for human-driven Data exchange Platform. Build awareness and engage people across Europe Test, develop and scale Platform to multiple industries and EU countries. Ensure interoperability through technology Proof- of-Concepts [ I H A N ® A P P R O V E D ] Branding. Develop common Roadmap for fair Data exchange Method. Build Common Governance Model [ I H A N ® A P P R O V E D ] Our project in nutshell
  • 16. What does IHAN® change? what is the current situation and our target goal? Antti Larsio (15min)
  • 17. Data collectors Current situation Data about me is somewhere out there I have to manage a lot of different accounts I have to manually copy my data between service providers Data about me Data collectors Data collectors
  • 18. Data collectors Current situation - trend Data companies have the data about people I have to buy data from data companies – or die Data companies will control service industries and me Data about me Data collectors Data collectors How to get data for my services? € / £ / $ € / £ / $
  • 19. Data collectorsRisk Data companies will control the whole service industry There is an unfair cost to get data Monopoly will decrease innovation Extra cost for me and control of innovations Data about me Data collectors Data collectors € € € € €
  • 20. Data collectors IHAN® future Data about me is somewhere out there - but I do know where and what It needs my authorization to use my data – I’m empowered My data can be gathered for my service on fair and reasonable terms Services will focus on value, quality and need – data is available by my consent Data about me Data collectors Data collectors LOG Authorization Service discovery Identifier wallet APIs Metadata exhange Data transfer Protocol for data requests
  • 21. IHAN® in a nutshell Service Data Authorization to use my data Service provider Requests for data Data providers
  • 22. What are IHAN® technical specifications? How does IHAN® architecture and technology principles look like? Jyrki Suokas (15min)
  • 23. Identity Data Consent Services Log End User Services and IHAN® services End user- Service Data Service provider Data providerEnd user ServicesIHAN Service provider Data providerEnd user
  • 24. IHAN® Services components End User Service Provider Data Provider Identity Data Consent Services Log Wallet of identifiers Master Service Directory End User Service Directory Service Provider Service Directory End User Data Directory Data Provider Data DirectoryService Provider Data Directory Service Order Data OrderConsent Directory End User Logs Data Provider LogsService Provider Logs
  • 25. IHAN® Technical Specification – Document about WHAT, not HOW - Contains documentation of all functional and non- functional requirements for IHAN® service layer - Architectural diagrams of components and data flows for reference architecture - Technical specification of IHAN® service messages on field level - IHAN® service documentation and how actual services will use IHAN® services - Governance – Initially created by Sitra project team – Maintained centrally by Sitra project team – Updated through learnings from IHAN® pilots - Initial version available 31.8.2018
  • 26. IHAN® and industry pilot approach What kind of support can service pilots expect Jyrki Suokas ( 5 min)
  • 27. Networks, industry expertise and business development - Sitra team can support Service projects with industry expertise and networking cross- pollination though our advisors - ”IHAN® project starter kit” with easy to use tools and templates to document and validate the new service Risto Tornivaara Former CEO of Danske Bank Finland Hannu Hämäläinen Former Ministerial adviser at Finnish Ministry of Social Affairs and Health Antti Larsio Former National Technology Officer Microsoft / HUS CIO / Telia IT Corporate Director
  • 28. How is IHAN® project proceeded? What kind of working methodology, tools and process will be used? Juhani Luoma-Kyyny ( 20 min)
  • 29. End User Services and IHAN® services End user- Service Data Service provider Data providerEnd user ServicesIHAN Service provider Data providerEnd user Identity Data Consent Services Log
  • 30. IHAN® technical component documentation End User Service Provider Data Provider Identity Data Consent Services Log Wallet of identifiers Master Service Directory End User Service Directory Service Provider Service Directory End User Data Directory Data Provider Data DirectoryService Provider Data Directory Service Order Data OrderConsent Directory End User Logs Data Provider LogsService Provider Logs
  • 31. Pilot Project 1 creates initial components and services End User Service Provider Data Provider Identity Data Consent Services Log Wallet of identifiers Master Service Directory End User Service Directory Service Provider Service Directory End User Data Directory Data Provider Data DirectoryService Provider Data Directory Service Order Data OrderConsent Directory End User Logs Data Provider LogsService Provider Logs
  • 32. Pilot Project 2 adds new and creates alternative components. More IHAN® services added End User Service Provider Data Provider Identity Data Consent Services Log Wallet of identifiers Master Service Directory End User Service Directory Service Provider Service Directory End User Data Directory Data Provider Data DirectoryService Provider Data Directory Service Order Data OrderConsent Directory End User Logs Data Provider LogsService Provider Logs Wallet of identifiers End User Logs
  • 33. Pilot Project 3 adds yet new components. More services to IHAN® layer End User Service Provider Data Provider Identity Data Consent Services Log Wallet of identifiers Master Service Directory End User Service Directory Service Provider Service Directory End User Data Directory Data Provider Data DirectoryService Provider Data Directory Service Order Data OrderConsent Directory End User Logs Data Provider LogsService Provider Logs Wallet of identifiers End User Logs
  • 34. Pilot Project n adds new and creates alternative components. IHAN® Service layer complete End User Service Provider Data Provider Identity Data Consent Services Log Wallet of identifiers Master Service Directory End User Service Directory Service Provider Service Directory End User Data Directory Data Provider Data DirectoryService Provider Data Directory Service Order Data OrderConsent Directory End User Logs Data Provider LogsService Provider Logs Wallet of identifiers End User Logs Data Provider Data DirectoryService Provider Data Directory
  • 35. IHAN® architecture implementations Collection of IHAN reference architectures
  • 36. FOR IHAN® PILOT PROJECTS WE ARE SEEKING EITHER ALREADY ONGOING PROJECTS OR PROJECTS THAT ARE READY FOR A QUICK LAUNCH.
  • 37. Pilot project criteria 1. Applicants: we are particularly seeking the kind of applicants operating in co-operation networks that involve various actors. 2. Implementation phase of the project: we are looking for applicants belonging to already existing ecosystems, with whom we can advance quickly. 3. User-oriented approach: the clear aim of the pilot project is to improve people’s everyday lives and opportunities for the management of their own information. 4. Technical solution: the pilot project needs to solve technical software component issues related to IHAN® principles, specified more closely in the application form. 5. Effectiveness: the pilot project aims to replace the current operating model, where an individual’s information is dispersed in the depths of various data storages owned by different systems and companies, with a human-oriented and fair exchange of data. 6. Visionary approach: the pilot project is aimed at the future and has a “novelty value”. 7. Feasibility: the applicant must have sufficient competence and, if necessary, a functioning subcontractor network for the development, launch and establishment of a feasible and economically sound solution. 8. Repeatability: the lessons learned from the pilot project and feasible solutions should also be able to be used in other sectors and scaled up. 9. Continuity: the application demonstrates the applicant’s strong commitment, resources and plans for the continuation of the operations after the project is over. 10. Transfer of intellectual property rights: the applicant is prepared to transfer intellectual property rights to the extent required by the pilot project, for example, in connection with the EU-wide workshops. 11. Other criteria: in addition to the criteria listed above, the pilot project meets the technical and other similar criteria to be specified in the application form.
  • 38. The stages of the call for funding applications The applicant fills in the application form and submits the application from to Sitra at the email address ihan@sitra.fi. Meeting with Sitra and the applicant selected to continue the process for further discussions (goals, schedule, resources) about the potential funding Sitra will evaluate which projects it will fund based on the application form and the common discussion. Those selected to continue the process will prepare a specified project plan serve as a basis for the funding agreements between Sitra and the applicants 5 . 2 3 1 4
  • 40. IHAN® Standardisation What does (Cen-Cenelec) process mean? What will we standardise? Markus Kalliola (10min) ®
  • 41. Regulation vs. standardisation - GDPR gives citizens new rights – To have a copy of their data in an electronic format – To transfer data from one service provider to another – To have right to be forgotten - GPDR doesn’t say how these new rights need to be implemented - Standarisation is a process of developing compatible technologies and processes - Multiple standards can exists to implement similar job – Picture standards JPG, GIF, PNG etc. – IHAN technical standard will be one standard among others to implement GDPR rights and other necessary processes to make human driven data economy possible
  • 42. CEN-CENELEC standardisation processes - CEN-CENELEC – European Standards (EN), European level, weighted vote – Example: EN 14484:2003 Health informatics - International transfer of personal health data covered by the EU data protection directive – Harmonization Document (HD), three languages, replaces national standards – Technical Specification (TS), National level, replaces national standards – Amendment to EN/HD – Technical Report (TR), done by a official Technical body, vote by simple majority – Guide, made by CEN member, vote by simple majority – Workshop Agreement (CWA) - ISO – Vienna agreement (1991) between ISO and CEN-CENELEC
  • 43. IHAN® workshop – Why CEN-CENELEC workshop? – International co-operation – Open process – Credibility in EU – Kick off meeting October – A year long process – Work Items – Work Item 0: Coordination – Work Item 1: Principles, architecture and requirements – Work Item 2: Identity and Data identifiers – Work Item 3: Orders and messages – Work Item 4: Distributed Log system – Work Item 5: Smart contract structure
  • 47. Main building blocks Trust domains Trust domains 1 2 3 4 5 6 7 7 7 9 8 1 0 1 0
  • 48. Wallet of identifiers Authentication - Collaboration with existing authentication solutions and development work - Strong authentication - Two factor authentication - Dezentralized authentication - OAuth, OpenID, OpenID Connect - Distributed Ledger Technology - FIDO, UAF, U2F Uniform Resource Indentifier, Uniform Resource Locator - IHAN number - Data - Credentials Wallet - Various authentication mechanism - Various URI/URL of data - Credentials - Combination of an individual and URI of data = IHAN number? - Cryptography - Interfaces, protocols, APIs 1
  • 49. Identifiers Data object (a person) Legitime data possessor Legitime service provider Individual / physical entity Organization Identity verified by a trusted 3rd party Application Web address Identity known by a mutual agreement, but not verified by 3rd party Identity unknown to external parties, known only by me Data about data object Device privateID agreedID verifiedID organizationID applicationID urlID deviceID dataID
  • 50. IHAN number (( privateID agreedID verifiedID) dataID )) f Generates asymmetric key-pair: Master key and Private key Master key known to both parties Private key known only by a person (data object) Data object can prove the relationship to the data by using IHAN number URI = scheme:[//authority]path[?query][#fragment] authority = [userinfo@]host[:port]
  • 51. Wallet of identifiers (( privateID agreedID verifiedID) dataID )) f Secure collection of IHAN numbers organizationID applicationID urlID deviceID Each connected to relevant dataID URI = scheme:[//authority]path[?query][#fragment] primary access mechanism network location
  • 52. Wallet of identifiers MyWallet key - Biometric - Hardware - Secured seed - IHAN foundation secured blockchain secured hash - Deterministic wallet IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata One ”card” per data possessor or service provider MyID may be verified, agreed or privateIHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata IHAN number (MyID and dataID) Master key Private key (encrypted by MyWallet key) Service description Data description Service provider Data provider Metadata Other
  • 53. Authorization - Content - Metadata structure and process - Encryption - PKI - IKE (Internet Key Exchange) - Chained authorization - Protocols - APIs - Log messages 2
  • 54. Authorization Data object (a person) Legitime data possessor Auhorization to use data (IHANAuth) Legitime data possessor New legitime data possessorLegitime service provider New legitime service provider If they have rights to give an authorization Data transfer
  • 55. Metadata Data about data Wallet of identifiers Metadata: link Data possessor Used standard XML - desciption
  • 56. Metadata - interoperability Data about data Data possessor A Used standard XML - desciption Data possessor B Used standard XML - desciption Service provider Based on metadata desciptions from both data possessor solving the interoperability and usage of data in order to provide services
  • 57. Service Directory - Personal Service Directory – Contains list of service user currently is using or has used before – If user opt-in/ shows intrest for new services (limited set) this allows service providers to propose new services in user’s Personal Service Directory. Only services that are possible are shown - Service discovery by user based on his/her current metadata of user data and what data of the user is accessible. - Master Service Directory – Service providers publish their services and describe what data of the user and what data from data sources is needed for the service to be created – Service discovery by user based on availability of users’ current metadata and data needed by services. - Service Provider Directory – Contains list of services users currently are using or have used before. Consent information and access mechanism to Data sources - iOS, Windows, Android - IE, Chrome, Mozilla, … - APIs - UI - Use cases - Similarity w X-Road 3
  • 58. Registration - Registration for service – When user gives order for service provider to connect to one or more data sources the service provider sends the consent related GDPR messages to data sources on behalf of the user – Order can be time limited – When user orders a service this triggers creation of – Identifiers – Service directory entry into Personal Service Directory and Service Provider Directory – Basic authorization – Terms of usage - Content - GDPR message - API 4
  • 59. Routing - Focus on Internet messages and data transportation - Authorization - Data - Blockchain 8
  • 60. Routing (to be defined) HTTPS TLS Log messages Wallet of identifiers - seed Permissioned blockchain – seed Permissioned blockchain – MyLog hash Provate blockchain - Mylog
  • 61. Data management Console - Functionality - UI - Security - Use cases - APIs 9
  • 62. Data Management Console Wallet of identifiers UI forWallet of identifiers UI forWallet of Logs UI for Authorization messages MyLog
  • 63. Web communication architecture, Interfaces, APIs - Registration - Authorization - Data requests - Data send, receive, (REST…) - Service directory - Trust domains - Data management console - Log - Data transportation - Wallet of identifiers 10

Notes de l'éditeur

  1. The EU’s new General Data Protection Regulation (GDPR) will be applied in each member state on 25 May 2018. It starting premise is the right of each individual to their own data and the protection of privacy. The new Payment Services Directive (PSD2) is to be implemented nationally by 13 January 2018 at the latest. The EU’s Eidas directive (Electronic identification and trust services for electronic transactions in the internal market) is to be brought into force across the whole EU by August 2018. In addition, Finland’s growth strategy is based to a significant extent on the development of ecosystems and platform economies!
  2. The best, cheapest or most environmentally friendly mobility solution for everyone, based on data accumulated on their mobility habits and needs (e.g. traffic volumes, transport modes used by the individual, routes, prices, etc.) Help for the promotion of well-being based on one's own health data with the help of a well-being analyst (e.g. nutrition habits, self-collected data on physical exercise, genome data, monitoring of well-being, health data, etc.) The individual can perceive alternatives, for example, if he/she inherits forests, but does not have knowledge of forestry (e.g. forest surveys, logistics solutions, weather data, measurement of production process, etc.)