SlideShare une entreprise Scribd logo
1  sur  49
autonomous
We all want to build autonomous systems – systems of machines that work together to almost magically improve our lives.
But we spend most of our days doing what is best described as - digital plumbing.
PLUMBING
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
To illustrate, let’s consider this extremely simple autonomous system.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we identify a person?
How do we authenticate them?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we know they entered?
With a device?
How do we identify the device?
Can we trust it?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we identify a room?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we change temperature?
With a device?
How do we identify the device?
Can we trust it?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
What is room temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we know their preferred temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
How do we identify a room?
What is room temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
How do we identify a person?
How do we authenticate them?
How do we know they entered?
With a device?
How do we identify the device?
Can we trust it?
How do we change temperature?
With a device?
How do we identify the device?
Can we trust it?
How do we know their preferred temperature?
Is it called temp, temperature or T?
Is it set in °C, °F or some other unit?
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
This seems hard, surely someone else has already built it.
Found one with a quick google search, but it only works with Nest and IFFTT, our hardware is different :(
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of People Identity Systems
Google, Facebook, Apple, Active Directory,
Custom Apps etc.
The problem gets worse if, like any good programmer, we only want to write this program once.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of phones, motion sensors, RFID reader etc.

100s of IoT platforms, proprietary systems etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
100s of building management
systems and custom apps etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of HVAC systems, Thermostats etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of custom apps.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
1000s of custom apps.
1000s of HVAC systems, Thermostats etc.
100s of building management
systems and custom apps etc.
1000s of phones, motion sensors, RFID reader etc.

100s of IoT platforms, proprietary systems etc.
1000s of People Identity Systems
Google, Facebook, Apple, Active Directory,
Custom Apps etc.
IF A PERSON ENTERS A ROOM
CHANGE ROOM TEMPERATURE to
THEIR PREFERENCE.
Also, this problem statement isn’t general enough, we like to write reusable code.
IF A SHIPMENT ENTERS A CONTAINER
CHANGE CONTAINER TEMPERATURE to
IDEAL TEMPERATURE OF SHIPMENT.
This new problem statement isn’t that different, lets generalize …
IF AN ENTITY THAT HAS PREFERENCES,
IS DETECTED AS HAVING ENTERED AN AREA THAT CAN APPLY PREFERENCES
APPLY ALL ENTITY PREFERENCES THAT THE AREA CAN APPLY
THAT THIS ENTITY IS AUTHORIZED TO APPLY TO THIS AREA.
PLUMBING
Most IoT developers spend most of their time dealing with this complicated plumbing, the magic is rare.
Privacy
Security
SCALABILITY
RELIABILITY
TRUST
All of these plumbing complications also manifest as weaknesses in other key architectural requirements.
IDENTITY
TRUST
INTEROPERABILITY
Ockam is applying several open standards and building open source tools to address these challenges.
Our thinking is organized in the above three layers.
IDENTITY
TRUST
INTEROPERABILITY
Decentralized Identifiers
Decentralized Key Management
Verifiable Claims
Linked Data Signatures
Linked Data
Shared Vocabularies
Introspect-able Services
Reputation Systems
Discover-able Services
LINKED DATA & JSON-LD
The progress made by the open web community around Linked Data can be applied to IoT,
this brings semantic meaning and relationships to IoT data …
Instead of describing temperature as a key of my choosing “temperature”, “temp” or “T” …
Let’s describe it with well defined semantics.
Now, two developers who have never met or coordinated can independently build
a temperature sensor and a controller that can work with each other.
SHARED VOCABULARIES
Shared vocabularies enable us to break down the n-squared integration problem that causes a lot of the plumbing we discussed.
RELATIONSHIPS
Linked Data also enables us to build a relationship graph within our data …
Now this data is about an entity (room) described by the above DID.
Decentralized IDENTIFIERS
did:ockam:2QyqWz4xWB5o4Pr9G9fcZjXTE2ej5
Method
Scheme
Method Specific Unique String
DIDs or Decentralized Identifiers leverage blockchains to enable cryptographically secured
IDs that are not locked in silos and can easily interoperate with other entities.
DID DOCUMENTS
DID Documents are Linked Data documents that describe the DID, they contain
the public keys of the DID, authentication methods, services etc…
GLOBALLY RESOLVABLE
If you have a DID string, you can resolve it to its DID Document via its Method.
We did not have this property of global uniqueness/resolvability across systems with old ID schemes like UUID etc.
This breaks silos.
cryptographically
verifIABLE ownership
DIDs are tied to public keys, you can prove ownership of an ID if you have the corresponding private key.
This enables cryptographically secure identities.
DECENTRALIZED KEY MANAGEMENT
The public keys tied to a DID can be rotated, revoked etc. DID on a blockchain enable a decentralized public key infrastructure.
IOT companies no longer need to spend millions on centralized PKIs that are often single points of failure.
PRIVACY BY DESIGN
DIDs enable privacy in several ways, for example one device can easily generate lots of pair-wise-unique DIDs
SERVICE DISCOVERY
The service section of the DID document enables de-coupling of systems.
VERIFIABLE CLAIMS
An Issuer can cryptographically sign claims about a subject.
DIDs + Verifiable Claims + Blockchain gives cryptographically signed IoT data
that cannot be tampered with in motion or at rest.
IDENTITY
TRUST
INTEROPERABILITY
Decentralized Identifiers
Decentralized Key Management
Verifiable Claims
Linked Data Signatures
Linked Data
Shared Vocabularies
Introspect-able Services
Reputation Systems
Discover-able Services
IDENTITY
TRUST
Decentralized Identifiers
Decentralized Key Management
Verifiable Claims
Linked Data Signatures
Reputation Systems
Blockchains are a new way to implement identity and trust, in
IoT systems, that unlocks interoperability in powerful ways.
github.com/ockam-network/ockam
Come contribute to Ockam on Github or Slack
bit.ly/2CXw4PDSlack:
Code:
w3.org/community/credentials
Shout out to the w3c credentials group that is developing many of these powerful standards.
Mrinal Wadhwa
CTO & Co-Founder
@mrinal
Attributions for the images used in this deck:
• pipes by Aleksandr Vector from the Noun Project
• valve by Ben Davis from the Noun Project
• Robot by Vectors Market from the Noun Project

Contenu connexe

Tendances

Project Oxygen
Project OxygenProject Oxygen
Project Oxygenshivu1234
 
Project oxygen
Project oxygenProject oxygen
Project oxygenlinkoravi
 
34191701 project-oxygen-vijeth
34191701 project-oxygen-vijeth34191701 project-oxygen-vijeth
34191701 project-oxygen-vijethamit243881
 
Iot devices
Iot devicesIot devices
Iot devicesDucat
 
Project oxygen
Project oxygenProject oxygen
Project oxygenamit243881
 
MIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar reportMIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar reportPranav Prakash
 
Home automation IoT
Home automation IoTHome automation IoT
Home automation IoTARUN REDDY M
 

Tendances (11)

Project Oxygen
Project OxygenProject Oxygen
Project Oxygen
 
Hn3114461450
Hn3114461450Hn3114461450
Hn3114461450
 
Project oxygen ppt
Project oxygen pptProject oxygen ppt
Project oxygen ppt
 
Project oxygen
Project oxygenProject oxygen
Project oxygen
 
34191701 project-oxygen-vijeth
34191701 project-oxygen-vijeth34191701 project-oxygen-vijeth
34191701 project-oxygen-vijeth
 
Iot devices
Iot devicesIot devices
Iot devices
 
Project oxygen
Project oxygenProject oxygen
Project oxygen
 
MIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar reportMIT Project Oxygen - A seminar report
MIT Project Oxygen - A seminar report
 
IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
 
The Internet n.o [beta]
The Internet n.o [beta]The Internet n.o [beta]
The Internet n.o [beta]
 
Home automation IoT
Home automation IoTHome automation IoT
Home automation IoT
 

Similaire à Build Autonomous Systems by Solving Digital Plumbing Problems

Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdfDecentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdfM KA
 
IoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfIoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfSudhanshiBakre1
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve ThemInnofied Solution
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersFIITJEE PU College
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxrupasharma39
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)GOPAL BASAK
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsAnand SFJ
 
How to Profit from IoT
How to Profit from IoTHow to Profit from IoT
How to Profit from IoTKevin Jones
 
Smart Home Evolution
Smart Home EvolutionSmart Home Evolution
Smart Home EvolutionLuca Lamera
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)Caston Thomas
 
Internet-of-things.pdf
Internet-of-things.pdfInternet-of-things.pdf
Internet-of-things.pdfsuperytnumber1
 
Your Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your WeightYour Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your WeightCheckmarx
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
 

Similaire à Build Autonomous Systems by Solving Digital Plumbing Problems (20)

Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdfDecentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
Decentralized Identifiers & Verifiable Claims for IoT-1548352210.pdf
 
IoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfIoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdf
 
Driving secureiot innovation
Driving secureiot innovationDriving secureiot innovation
Driving secureiot innovation
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
 
Internet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginnersInternet of Things- IOT 101 for beginners
Internet of Things- IOT 101 for beginners
 
IOT LADEN GHISING.pptx
IOT LADEN GHISING.pptxIOT LADEN GHISING.pptx
IOT LADEN GHISING.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
How Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT ApplicationsHow Internet of Things Works | IoT Examples | IoT Applications
How Internet of Things Works | IoT Examples | IoT Applications
 
How to Profit from IoT
How to Profit from IoTHow to Profit from IoT
How to Profit from IoT
 
Smart Home Evolution
Smart Home EvolutionSmart Home Evolution
Smart Home Evolution
 
internet of things
internet of thingsinternet of things
internet of things
 
New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)New challenges to secure the IoT (with notes)
New challenges to secure the IoT (with notes)
 
IoT Architecture .pdf
IoT Architecture .pdfIoT Architecture .pdf
IoT Architecture .pdf
 
Internet-of-things.pdf
Internet-of-things.pdfInternet-of-things.pdf
Internet-of-things.pdf
 
Your Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your WeightYour Smart Scale Is Leaking More than Your Weight
Your Smart Scale Is Leaking More than Your Weight
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 

Plus de Mrinal Wadhwa

Edge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of ThingsEdge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of ThingsMrinal Wadhwa
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...Mrinal Wadhwa
 
Better Parking. Better Communities.
Better Parking. Better Communities.Better Parking. Better Communities.
Better Parking. Better Communities.Mrinal Wadhwa
 
Bits, Bytes and Blobs
Bits, Bytes and BlobsBits, Bytes and Blobs
Bits, Bytes and BlobsMrinal Wadhwa
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaMrinal Wadhwa
 
An Introduction To Rich Internet Apllications
An Introduction To Rich Internet ApllicationsAn Introduction To Rich Internet Apllications
An Introduction To Rich Internet ApllicationsMrinal Wadhwa
 
Custom Components In Flex 4
Custom Components In Flex 4Custom Components In Flex 4
Custom Components In Flex 4Mrinal Wadhwa
 
Flex 4 Component Lifecycle
Flex 4 Component LifecycleFlex 4 Component Lifecycle
Flex 4 Component LifecycleMrinal Wadhwa
 
Introduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIRIntroduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIRMrinal Wadhwa
 

Plus de Mrinal Wadhwa (10)

Edge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of ThingsEdge Computing and Machine Learning for a better Internet of Things
Edge Computing and Machine Learning for a better Internet of Things
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
Austin Smart City Readiness Workshop - Viability and Sustainability of IoT Sm...
 
Better Parking. Better Communities.
Better Parking. Better Communities.Better Parking. Better Communities.
Better Parking. Better Communities.
 
Bits, Bytes and Blobs
Bits, Bytes and BlobsBits, Bytes and Blobs
Bits, Bytes and Blobs
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
 
An Introduction To Rich Internet Apllications
An Introduction To Rich Internet ApllicationsAn Introduction To Rich Internet Apllications
An Introduction To Rich Internet Apllications
 
Custom Components In Flex 4
Custom Components In Flex 4Custom Components In Flex 4
Custom Components In Flex 4
 
Flex 4 Component Lifecycle
Flex 4 Component LifecycleFlex 4 Component Lifecycle
Flex 4 Component Lifecycle
 
Introduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIRIntroduction to Rich Internet Applications, Flex, AIR
Introduction to Rich Internet Applications, Flex, AIR
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Build Autonomous Systems by Solving Digital Plumbing Problems

  • 1. autonomous We all want to build autonomous systems – systems of machines that work together to almost magically improve our lives.
  • 2. But we spend most of our days doing what is best described as - digital plumbing. PLUMBING
  • 3. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. To illustrate, let’s consider this extremely simple autonomous system.
  • 4. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we identify a person? How do we authenticate them?
  • 5. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we know they entered? With a device? How do we identify the device? Can we trust it?
  • 6. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we identify a room?
  • 7. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we change temperature? With a device? How do we identify the device? Can we trust it?
  • 8. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. What is room temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit?
  • 9. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we know their preferred temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit?
  • 10. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. How do we identify a room? What is room temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit? How do we identify a person? How do we authenticate them? How do we know they entered? With a device? How do we identify the device? Can we trust it? How do we change temperature? With a device? How do we identify the device? Can we trust it? How do we know their preferred temperature? Is it called temp, temperature or T? Is it set in °C, °F or some other unit?
  • 11. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. This seems hard, surely someone else has already built it.
  • 12. Found one with a quick google search, but it only works with Nest and IFFTT, our hardware is different :(
  • 13. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of People Identity Systems Google, Facebook, Apple, Active Directory, Custom Apps etc. The problem gets worse if, like any good programmer, we only want to write this program once.
  • 14. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of phones, motion sensors, RFID reader etc.
 100s of IoT platforms, proprietary systems etc.
  • 15. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 100s of building management systems and custom apps etc.
  • 16. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of HVAC systems, Thermostats etc.
  • 17. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of custom apps.
  • 18. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. 1000s of custom apps. 1000s of HVAC systems, Thermostats etc. 100s of building management systems and custom apps etc. 1000s of phones, motion sensors, RFID reader etc.
 100s of IoT platforms, proprietary systems etc. 1000s of People Identity Systems Google, Facebook, Apple, Active Directory, Custom Apps etc.
  • 19. IF A PERSON ENTERS A ROOM CHANGE ROOM TEMPERATURE to THEIR PREFERENCE. Also, this problem statement isn’t general enough, we like to write reusable code.
  • 20. IF A SHIPMENT ENTERS A CONTAINER CHANGE CONTAINER TEMPERATURE to IDEAL TEMPERATURE OF SHIPMENT. This new problem statement isn’t that different, lets generalize …
  • 21. IF AN ENTITY THAT HAS PREFERENCES, IS DETECTED AS HAVING ENTERED AN AREA THAT CAN APPLY PREFERENCES APPLY ALL ENTITY PREFERENCES THAT THE AREA CAN APPLY THAT THIS ENTITY IS AUTHORIZED TO APPLY TO THIS AREA.
  • 22. PLUMBING Most IoT developers spend most of their time dealing with this complicated plumbing, the magic is rare.
  • 23. Privacy Security SCALABILITY RELIABILITY TRUST All of these plumbing complications also manifest as weaknesses in other key architectural requirements.
  • 24. IDENTITY TRUST INTEROPERABILITY Ockam is applying several open standards and building open source tools to address these challenges. Our thinking is organized in the above three layers.
  • 25. IDENTITY TRUST INTEROPERABILITY Decentralized Identifiers Decentralized Key Management Verifiable Claims Linked Data Signatures Linked Data Shared Vocabularies Introspect-able Services Reputation Systems Discover-able Services
  • 26. LINKED DATA & JSON-LD The progress made by the open web community around Linked Data can be applied to IoT, this brings semantic meaning and relationships to IoT data …
  • 27. Instead of describing temperature as a key of my choosing “temperature”, “temp” or “T” …
  • 28. Let’s describe it with well defined semantics.
  • 29. Now, two developers who have never met or coordinated can independently build a temperature sensor and a controller that can work with each other.
  • 30. SHARED VOCABULARIES Shared vocabularies enable us to break down the n-squared integration problem that causes a lot of the plumbing we discussed.
  • 31. RELATIONSHIPS Linked Data also enables us to build a relationship graph within our data …
  • 32. Now this data is about an entity (room) described by the above DID.
  • 33. Decentralized IDENTIFIERS did:ockam:2QyqWz4xWB5o4Pr9G9fcZjXTE2ej5 Method Scheme Method Specific Unique String DIDs or Decentralized Identifiers leverage blockchains to enable cryptographically secured IDs that are not locked in silos and can easily interoperate with other entities.
  • 34. DID DOCUMENTS DID Documents are Linked Data documents that describe the DID, they contain the public keys of the DID, authentication methods, services etc…
  • 35.
  • 36. GLOBALLY RESOLVABLE If you have a DID string, you can resolve it to its DID Document via its Method. We did not have this property of global uniqueness/resolvability across systems with old ID schemes like UUID etc. This breaks silos.
  • 37. cryptographically verifIABLE ownership DIDs are tied to public keys, you can prove ownership of an ID if you have the corresponding private key. This enables cryptographically secure identities.
  • 38. DECENTRALIZED KEY MANAGEMENT The public keys tied to a DID can be rotated, revoked etc. DID on a blockchain enable a decentralized public key infrastructure. IOT companies no longer need to spend millions on centralized PKIs that are often single points of failure.
  • 39. PRIVACY BY DESIGN DIDs enable privacy in several ways, for example one device can easily generate lots of pair-wise-unique DIDs
  • 40. SERVICE DISCOVERY The service section of the DID document enables de-coupling of systems.
  • 41. VERIFIABLE CLAIMS An Issuer can cryptographically sign claims about a subject.
  • 42.
  • 43. DIDs + Verifiable Claims + Blockchain gives cryptographically signed IoT data that cannot be tampered with in motion or at rest.
  • 44. IDENTITY TRUST INTEROPERABILITY Decentralized Identifiers Decentralized Key Management Verifiable Claims Linked Data Signatures Linked Data Shared Vocabularies Introspect-able Services Reputation Systems Discover-able Services
  • 45. IDENTITY TRUST Decentralized Identifiers Decentralized Key Management Verifiable Claims Linked Data Signatures Reputation Systems Blockchains are a new way to implement identity and trust, in IoT systems, that unlocks interoperability in powerful ways.
  • 46. github.com/ockam-network/ockam Come contribute to Ockam on Github or Slack bit.ly/2CXw4PDSlack: Code:
  • 47. w3.org/community/credentials Shout out to the w3c credentials group that is developing many of these powerful standards.
  • 48. Mrinal Wadhwa CTO & Co-Founder @mrinal
  • 49. Attributions for the images used in this deck: • pipes by Aleksandr Vector from the Noun Project • valve by Ben Davis from the Noun Project • Robot by Vectors Market from the Noun Project