SlideShare a Scribd company logo
1 of 25
Identity in Web3
CONFIDENTIAL
About Harrison, @theCEODad
• CEO & Co-Founder of Spokeo
• Co-Chair of W3C Credentials Community Group
• Dad of 3 sons
About Spokeo
• Spokeo is a people intelligence service that helps over
15M users a month to search and connect with others
• We are the only Data + UX company in our space,
organizing over 16 billion records into 600M entities
• We generate about $90M/year and have been
profitable without VC funding since 2008
About
What Is Identity?
Identity is the accessible data about an entity
CONFIDENTIAL
Identity is accessible data or characteristics that define a
distinct entity. It answers who we are
• People Data: Include name, contact info, personality,
behaviors, demo, credit, reputation, … Data sources
could be first-party, second-party, or third-party
• Entity Being: Entity is a thing with distinct and
independent existence. The constituent parts could
change over time but remain connected
• Access Control: Make sure that the right people can
access the right data or resources. Include
authentication, authorization, and audit processes
What is Identity?
CONFIDENTIAL
Identity today is the How to the What, or a means to an end.
Itʼs the much-needed fabric of the Web that empowers:
• People Search: Connect and verify people with trust
• Genealogy: Research ancestors and heritage
• Fraud Prevention: Identify and prevent fraud
• Financial Crime Compliance: KYC, AML, … etc
• Credit and Payments: Facilitate financial transactions
• Authentication: Secure account access
• ID Protection: Secure digital identities
• B2B Marketing: Find sales leads and customers
• Marketing Analytics: Optimize ad spend and reach
Identity Use Cases
CONFIDENTIAL
Identity market is huge and generates more than $70B/year
in the US alone (a non-exhaustive list of segments below):
• B2C People Search: ~$500M
• B2C ID Protection and Password Managers: ~$5B
• B2C Genealogy: ~$1.5B
• B2B Identity Verification & Fraud Prevention: ~$20B
• B2B Authentication & KYC: ~$10B
• B2B Identity & Access Management: ~$5B
• B2B Credit Bureau: ~$15B
• B2B FCRA Employment Screening: ~$2B
• B2B Marketing Tech: ~$75B
Identity Markets in the US
What is Identity in Web3?
Identity in Web3 is the Decentralized Identity
CONFIDENTIAL
Web3 is the decentralized web that heralds the concept of
digital ownership
• Decentralization: The distribution of control or power
to multiple entities rather than a single one
• Digital Ownership: The state or fact of legal
possession and control over digital, intangible
properties in the metaverse
• Tokenomics: The economics and factors around how
to value and price a token or cryptocurrency
If Web1 is Read and Web2 is Read & Write, then Web3 is
Read & Write & Own
What is Web3?
CONFIDENTIAL
The problem of decentralized identity can be broken down to decentralized entity, decentralized data
aggregation, and decentralized data access
Decentralized Identity
Entity Data Access
Centralized
SSN, Passport #, Twitter
Handle, Facebook ID,
URL, Vendor IDs
Big Tech, Government,
Credit Bureaus, Data
Aggregators
Social Login, Federated
ID, Big Tech, Govern.
Decentralized
Decentralized Identifier,
Soulbround NFT, Entity
Resolution, HD Keys
Verifiable Credentials,
Personal Data Store,
IPFS, De. Reputation
Self-Sovereign Identity,
Self-Issued OpenID
Provider
CONFIDENTIAL
Decentralized identity will overtake (but not kill) the
current centralized identity paradigm because:
• Data Regulations: CCPA, CPRA, and GDPR has created
data rights. FCRA, HIPAA, and other laws require user
consent. eIDAS in Europe requires SSI
• Data Quality: Multi-party (1st + 2nd + 3rd-party) data
validation and the incorporation of UGC ensures better
data quality than single-party approaches
• Network Effect: Identity as a multi-sided platform
enables virality and network effect
• Web3 Movement: New genʼs distrust for big tech will
lead to decentralization and the next ebb/flow in Social
Cycle Theory
Why Decentralized Identity?
Self-Sovereign Identity
SSI empowers users control of their identities
CONFIDENTIAL
Identity can be modeled as a multi-sided network with 3
IAM (Identity and Access Management) roles:
• Searcher & Verifier: User or business who wants
access to Data Subjectʼs identity for ID verification,
authentication, investigation, … purposes
• Data Subject & Holder: User or business whose
identity is being accessed. Ex: User who wants access
to a service, person being investigated, …
• Issuer & Data Source: User or business who creates
identity info about the data subject. Ex: DMV (driver
license), Uber (driver profile), users (user ratings), …
• The same person can wear one or multiple roles
Identity Access Model
Identity’s Role-Based
Access Control Model
Data
Subject
Searcher
Issuer
CONFIDENTIAL
Centralized Trust Model
Holder /
Data
Subject
S
e
a
r
c
h
e
r
r
e
q
u
e
s
t
s
i
n
f
o
a
b
o
u
t
D
a
t
a
S
u
b
j
e
c
t
f
r
o
m
D
a
t
a
S
o
u
r
c
e
s
w
i
t
h
o
u
t
D
a
t
a
S
u
b
j
e
c
t
’
s
k
n
o
w
l
e
d
g
e
Verifier /
Searcher
Issuer /
Source /
ID Provider
1. Anonymous Search
Data Subject is unaware
of id transaction
The power over ID transactions lies
outside of Data Subjectʼs control
1. Anonymous Search: Data Subject is
unaware of ID transaction
2. ID Verification: Data Subject is
unaware of how it works
3. Social & Federated Login: ID
Provider (ex: Google Login)
intermediates ID transaction
4. FCRA Employment Screening:
Company intermediates between
Data Subject and Data Sources
Current ID Access Model
CONFIDENTIAL
Centralized Trust Model
Holder /
Data
Subject
V
e
r
i
fi
e
r
r
e
q
u
e
s
t
s
i
n
f
o
a
b
o
u
t
D
a
t
a
S
u
b
j
e
c
t
f
r
o
m
D
a
t
a
S
o
u
r
c
e
s
w
i
t
h
o
u
t
D
a
t
a
S
u
b
j
e
c
t
’
s
k
n
o
w
l
e
d
g
e
Verifier /
Searcher
Issuer /
Source /
ID Provider
2. ID Verification
Data Subject is unaware
of how it works. Ex:
ThreatMetrix, Ekata
The power over ID transactions lies
outside of Data Subjectʼs control
1. Anonymous Search: Data Subject is
unaware of ID transaction
2. ID Verification: Data Subject is
unaware of how it works
3. Social & Federated Login: ID
Provider (ex: Google Login)
intermediates ID transaction
4. FCRA Employment Screening:
Company intermediates between
Data Subject and Data Sources
Current ID Access Model
CONFIDENTIAL
Centralized Trust Model
Holder /
Data
Subject
S
e
r
v
i
c
e
P
r
o
v
i
d
e
r
r
e
d
i
r
e
c
t
s
U
s
e
r
/
H
o
l
d
e
r
t
o
I
d
e
n
t
i
t
y
P
r
o
v
i
d
e
r
(
e
.
g
.
G
o
o
g
l
e
/
F
a
c
e
b
o
o
k
L
o
g
i
n
)
f
o
r
a
u
t
h
e
n
t
i
c
a
t
i
o
n
Verifier /
Searcher
Issuer /
Source /
ID Provider
3. Social Login
ID Provider (ex: Google
Login) intermediates id
transaction
The power over ID transactions lies
outside of Data Subjectʼs control
1. Anonymous Search: Data Subject is
unaware of ID transaction
2. ID Verification: Data Subject is
unaware of how it works
3. Social & Federated Login: ID
Provider (ex: Google Login)
intermediates ID transaction
4. FCRA Employment Screening:
Company intermediates between
Data Subject and Data Sources
Current ID Access Model
U
s
e
r
/
H
o
l
d
e
r
l
o
g
i
n
s
a
n
d
a
u
t
h
e
n
t
i
c
a
t
e
s
w
i
t
h
I
d
e
n
t
i
t
y
P
r
o
v
i
d
e
r
.
I
d
e
n
t
i
t
y
P
r
o
v
i
d
e
r
t
h
e
n
i
s
s
u
e
s
a
u
t
h
o
r
i
z
a
t
i
o
n
t
o
k
e
n
CONFIDENTIAL
Centralized Trust Model
Holder /
Data
Subject
S
e
a
r
c
h
e
r
(
C
o
m
p
a
n
y
)
r
e
q
u
e
s
t
s
i
n
f
o
a
b
o
u
t
D
a
t
a
S
u
b
j
e
c
t
(
C
a
n
d
i
d
a
t
e
)
f
r
o
m
D
a
t
a
S
o
u
r
c
e
s
t
o
p
e
r
f
o
r
m
t
h
e
s
c
r
e
e
n
Verifier /
Searcher
Issuer /
Source /
ID Provider
4. FCRA Screening
Company intermediates
id transaction
The power over ID transactions lies
outside of Data Subjectʼs control
1. Anonymous Search: Data Subject is
unaware of ID transaction
2. ID Verification: Data Subject is
unaware of how it works
3. Social & Federated Login: ID
Provider (ex: Google Login)
intermediates ID transaction
4. FCRA Employment Screening:
Company intermediates between
Data Subject and Data Sources
Current ID Access Model
Searcher (Company) requests the permission of Data
Subject (Candidate) for employment screening
CONFIDENTIAL
(4) Data Subject sends verifiable data presentation about
them back to Searcher / Verifier
Holder /
Data
Subject
Issuer /
Source /
ID Provider
(
3
)
I
s
s
u
e
r
i
s
s
u
e
s
v
e
r
i
fi
e
d
d
a
t
a
a
b
o
u
t
D
a
t
a
S
u
b
j
e
c
t
t
o
D
a
t
a
S
u
b
j
e
c
t
The power over ID transactions lies
within User / Data Subjectʼs control
• Self-Sovereign Control: Data
Subject intermediates ID txn and
controls what to share to whom
• Ultimate Decentralization: If all ID
txn are self-sovereign, tens of
billions of Data Subjects gain full
control over their identities
• New Economy: The emergence of
identity ownership will empower
new economy / capitalism
Future SSI Model
Self-Sovereign Identity
User / Data Subject
intermediates id
transaction
Verifier /
Searcher
(
2
)
D
a
t
a
S
u
b
j
e
c
t
r
e
q
u
e
s
t
s
I
s
s
u
e
r
(
s
)
f
o
r
t
h
e
i
r
d
a
t
a
(1) Searcher / Verifier requests Data Subject for their info
Notable Technologies
How to enable Decentralized Identity
CONFIDENTIAL
Verifiable Credentials empowers decentralized triangle of
trust via cryptographic proof
• Credential: A set of claims (attributes about Data
Subject) made by an Issuer. Like “record” or “row”
• Verifiable Credential: Credential that is digitally
signed by Issuer and can be cryptographically verified
• Cryptographic Proof: Issuer signs cred with its private
key. Verifier verifies cred with Issuerʼs public key
• Issuer vs. Holder Signatures: Holder/Presenter
aggregates creds into a presentation and signs it
• Transitive Trust: Verifier can trust a credential without
interacting with the Issuer. Decouple Data, Trust, Access
Verifiable Credentials
CONFIDENTIAL
Presentation is an aggregate of one or more credentials
that represents a persona or a facet of an identity
• Verifiable Presentation: A presentation doc digitally
signed and attested by the Holder (e.g. Presenter)
• Decentralized Aggregation: Localized data
aggregation by Data Subject / Userʼs identity wallet
• Selective Disclosure: The ability of Holder to make
fine-grained decisions about what information to share
• Zero-Knowledge Proof: Prove that something is true
without conveying any additional information
• Privacy Recommender: Recommend what to share to
whom, when, and where
Verifiable Presentation
CONFIDENTIAL
Identifier is the name of an entity. Unique identifier
uniquely identifies an entity and enables its existence
• Decentralized Identifiers (DIDs): A new unique
identifier that doesnʼt require a centralized registration
authority and is often generated cryptographically
• Self-Sovereign Control: Enable Controller or Subject
to prove control without requiring 3rd-party permission
• Cryptographic Proof: Signer signs DID with its private
key. Verifier verifies cred with Signerʼs public key
• Distributed Ledger: “Blockchain” tech often used as
verifiable data registries where the DIDs are recorded
• DIDComm: Communication protocol built atop of DIDs
Decentralized Identifier
CONFIDENTIAL
Entity Resolution creates a digital identity by connecting
records referring to the same entity across different sources
• Record Matching: Compare and decide whether two
records refer to the same entity
• Record Linking: Create and assign an unique identifier
to records and connect them together
• Horizontal Linking: Linking where all info required to
generate an identifier is within a row or record. Ex:
Phone IDs or Address IDs
• Vertical Linking: Linking where info required to
generate an identifier is not contained solely within its
own row. Ex: Person IDs
Entity Resolution
CONFIDENTIAL
Authentication creates and/or proves the linkage between a
physical identity and a digital identity
• Multi-Factor Authentication: Multiple evidences
across different dimensions ensure higher security
• Inherence Factors: Who you are. Ex: Facial biometrics,
fingerprint, voice authentication, typing behaviors, …
• Knowledge Factors: What you know. Ex: Password,
secret phrase, Knowledge-Based Authentication, …
• Possession Factors: What you have. Ex: SMS One-Time
Passcode, Email Verification, Hardware Security Key, …
• Location Factors: Where you are
• Proxy Factors: Trust authn. done by 3rd parties
Authentication
Learn More
Follow me @theCEODad or @Tang_Toks
Follow @Spokeo, and check out Spokeo.com/Careers
CONFIDENTIAL

More Related Content

Similar to Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity

LVIMA DPD 2015 - Qualia
LVIMA DPD 2015 - QualiaLVIMA DPD 2015 - Qualia
LVIMA DPD 2015 - QualiaChris Evans
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG UpdateIan Glazer
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...ForgeRock
 
Building Consumers Trust: The role of transparency and control
Building Consumers Trust: The role of transparency and controlBuilding Consumers Trust: The role of transparency and control
Building Consumers Trust: The role of transparency and controlMicheleNati
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxstirlingvwriters
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfssuser00208b
 

Similar to Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity (20)

Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
 
LVIMA DPD 2015 - Qualia
LVIMA DPD 2015 - QualiaLVIMA DPD 2015 - Qualia
LVIMA DPD 2015 - Qualia
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
NSTIC and IDESG Update
NSTIC and IDESG UpdateNSTIC and IDESG Update
NSTIC and IDESG Update
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
 
Building Consumers Trust: The role of transparency and control
Building Consumers Trust: The role of transparency and controlBuilding Consumers Trust: The role of transparency and control
Building Consumers Trust: The role of transparency and control
 
National Volunteering Forum: May18
National Volunteering Forum: May18National Volunteering Forum: May18
National Volunteering Forum: May18
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docx
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdfDefi MOOC Fa21 - Decentralized Identity.pptx.pdf
Defi MOOC Fa21 - Decentralized Identity.pptx.pdf
 

More from Data Con LA

Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA
 
Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA
 
Data Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup ShowcaseData Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup ShowcaseData Con LA
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA
 
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA
 
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA
 
Data Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learningData Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learningData Con LA
 
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA
 
Data Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentationData Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentationData Con LA
 
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA
 
Data Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA
 
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA
 
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA
 
Data Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data ScienceData Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data ScienceData Con LA
 
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA
 
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA
 
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA
 
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA
 
Data Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with KafkaData Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with KafkaData Con LA
 

More from Data Con LA (20)

Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 Keynotes
 
Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 Keynotes
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 Keynote
 
Data Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup ShowcaseData Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup Showcase
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 Keynote
 
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendations
 
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA 2022 - AI Ethics
Data Con LA 2022 - AI Ethics
 
Data Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learningData Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learning
 
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
 
Data Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentationData Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentation
 
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
 
Data Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWS
 
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
 
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
 
Data Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data ScienceData Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data Science
 
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
 
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
 
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
 
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
 
Data Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with KafkaData Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with Kafka
 

Recently uploaded

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 

Recently uploaded (20)

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 

Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity

  • 2. CONFIDENTIAL About Harrison, @theCEODad • CEO & Co-Founder of Spokeo • Co-Chair of W3C Credentials Community Group • Dad of 3 sons About Spokeo • Spokeo is a people intelligence service that helps over 15M users a month to search and connect with others • We are the only Data + UX company in our space, organizing over 16 billion records into 600M entities • We generate about $90M/year and have been profitable without VC funding since 2008 About
  • 3. What Is Identity? Identity is the accessible data about an entity
  • 4. CONFIDENTIAL Identity is accessible data or characteristics that define a distinct entity. It answers who we are • People Data: Include name, contact info, personality, behaviors, demo, credit, reputation, … Data sources could be first-party, second-party, or third-party • Entity Being: Entity is a thing with distinct and independent existence. The constituent parts could change over time but remain connected • Access Control: Make sure that the right people can access the right data or resources. Include authentication, authorization, and audit processes What is Identity?
  • 5. CONFIDENTIAL Identity today is the How to the What, or a means to an end. Itʼs the much-needed fabric of the Web that empowers: • People Search: Connect and verify people with trust • Genealogy: Research ancestors and heritage • Fraud Prevention: Identify and prevent fraud • Financial Crime Compliance: KYC, AML, … etc • Credit and Payments: Facilitate financial transactions • Authentication: Secure account access • ID Protection: Secure digital identities • B2B Marketing: Find sales leads and customers • Marketing Analytics: Optimize ad spend and reach Identity Use Cases
  • 6. CONFIDENTIAL Identity market is huge and generates more than $70B/year in the US alone (a non-exhaustive list of segments below): • B2C People Search: ~$500M • B2C ID Protection and Password Managers: ~$5B • B2C Genealogy: ~$1.5B • B2B Identity Verification & Fraud Prevention: ~$20B • B2B Authentication & KYC: ~$10B • B2B Identity & Access Management: ~$5B • B2B Credit Bureau: ~$15B • B2B FCRA Employment Screening: ~$2B • B2B Marketing Tech: ~$75B Identity Markets in the US
  • 7. What is Identity in Web3? Identity in Web3 is the Decentralized Identity
  • 8. CONFIDENTIAL Web3 is the decentralized web that heralds the concept of digital ownership • Decentralization: The distribution of control or power to multiple entities rather than a single one • Digital Ownership: The state or fact of legal possession and control over digital, intangible properties in the metaverse • Tokenomics: The economics and factors around how to value and price a token or cryptocurrency If Web1 is Read and Web2 is Read & Write, then Web3 is Read & Write & Own What is Web3?
  • 9. CONFIDENTIAL The problem of decentralized identity can be broken down to decentralized entity, decentralized data aggregation, and decentralized data access Decentralized Identity Entity Data Access Centralized SSN, Passport #, Twitter Handle, Facebook ID, URL, Vendor IDs Big Tech, Government, Credit Bureaus, Data Aggregators Social Login, Federated ID, Big Tech, Govern. Decentralized Decentralized Identifier, Soulbround NFT, Entity Resolution, HD Keys Verifiable Credentials, Personal Data Store, IPFS, De. Reputation Self-Sovereign Identity, Self-Issued OpenID Provider
  • 10. CONFIDENTIAL Decentralized identity will overtake (but not kill) the current centralized identity paradigm because: • Data Regulations: CCPA, CPRA, and GDPR has created data rights. FCRA, HIPAA, and other laws require user consent. eIDAS in Europe requires SSI • Data Quality: Multi-party (1st + 2nd + 3rd-party) data validation and the incorporation of UGC ensures better data quality than single-party approaches • Network Effect: Identity as a multi-sided platform enables virality and network effect • Web3 Movement: New genʼs distrust for big tech will lead to decentralization and the next ebb/flow in Social Cycle Theory Why Decentralized Identity?
  • 11. Self-Sovereign Identity SSI empowers users control of their identities
  • 12. CONFIDENTIAL Identity can be modeled as a multi-sided network with 3 IAM (Identity and Access Management) roles: • Searcher & Verifier: User or business who wants access to Data Subjectʼs identity for ID verification, authentication, investigation, … purposes • Data Subject & Holder: User or business whose identity is being accessed. Ex: User who wants access to a service, person being investigated, … • Issuer & Data Source: User or business who creates identity info about the data subject. Ex: DMV (driver license), Uber (driver profile), users (user ratings), … • The same person can wear one or multiple roles Identity Access Model Identity’s Role-Based Access Control Model Data Subject Searcher Issuer
  • 13. CONFIDENTIAL Centralized Trust Model Holder / Data Subject S e a r c h e r r e q u e s t s i n f o a b o u t D a t a S u b j e c t f r o m D a t a S o u r c e s w i t h o u t D a t a S u b j e c t ’ s k n o w l e d g e Verifier / Searcher Issuer / Source / ID Provider 1. Anonymous Search Data Subject is unaware of id transaction The power over ID transactions lies outside of Data Subjectʼs control 1. Anonymous Search: Data Subject is unaware of ID transaction 2. ID Verification: Data Subject is unaware of how it works 3. Social & Federated Login: ID Provider (ex: Google Login) intermediates ID transaction 4. FCRA Employment Screening: Company intermediates between Data Subject and Data Sources Current ID Access Model
  • 14. CONFIDENTIAL Centralized Trust Model Holder / Data Subject V e r i fi e r r e q u e s t s i n f o a b o u t D a t a S u b j e c t f r o m D a t a S o u r c e s w i t h o u t D a t a S u b j e c t ’ s k n o w l e d g e Verifier / Searcher Issuer / Source / ID Provider 2. ID Verification Data Subject is unaware of how it works. Ex: ThreatMetrix, Ekata The power over ID transactions lies outside of Data Subjectʼs control 1. Anonymous Search: Data Subject is unaware of ID transaction 2. ID Verification: Data Subject is unaware of how it works 3. Social & Federated Login: ID Provider (ex: Google Login) intermediates ID transaction 4. FCRA Employment Screening: Company intermediates between Data Subject and Data Sources Current ID Access Model
  • 15. CONFIDENTIAL Centralized Trust Model Holder / Data Subject S e r v i c e P r o v i d e r r e d i r e c t s U s e r / H o l d e r t o I d e n t i t y P r o v i d e r ( e . g . G o o g l e / F a c e b o o k L o g i n ) f o r a u t h e n t i c a t i o n Verifier / Searcher Issuer / Source / ID Provider 3. Social Login ID Provider (ex: Google Login) intermediates id transaction The power over ID transactions lies outside of Data Subjectʼs control 1. Anonymous Search: Data Subject is unaware of ID transaction 2. ID Verification: Data Subject is unaware of how it works 3. Social & Federated Login: ID Provider (ex: Google Login) intermediates ID transaction 4. FCRA Employment Screening: Company intermediates between Data Subject and Data Sources Current ID Access Model U s e r / H o l d e r l o g i n s a n d a u t h e n t i c a t e s w i t h I d e n t i t y P r o v i d e r . I d e n t i t y P r o v i d e r t h e n i s s u e s a u t h o r i z a t i o n t o k e n
  • 16. CONFIDENTIAL Centralized Trust Model Holder / Data Subject S e a r c h e r ( C o m p a n y ) r e q u e s t s i n f o a b o u t D a t a S u b j e c t ( C a n d i d a t e ) f r o m D a t a S o u r c e s t o p e r f o r m t h e s c r e e n Verifier / Searcher Issuer / Source / ID Provider 4. FCRA Screening Company intermediates id transaction The power over ID transactions lies outside of Data Subjectʼs control 1. Anonymous Search: Data Subject is unaware of ID transaction 2. ID Verification: Data Subject is unaware of how it works 3. Social & Federated Login: ID Provider (ex: Google Login) intermediates ID transaction 4. FCRA Employment Screening: Company intermediates between Data Subject and Data Sources Current ID Access Model Searcher (Company) requests the permission of Data Subject (Candidate) for employment screening
  • 17. CONFIDENTIAL (4) Data Subject sends verifiable data presentation about them back to Searcher / Verifier Holder / Data Subject Issuer / Source / ID Provider ( 3 ) I s s u e r i s s u e s v e r i fi e d d a t a a b o u t D a t a S u b j e c t t o D a t a S u b j e c t The power over ID transactions lies within User / Data Subjectʼs control • Self-Sovereign Control: Data Subject intermediates ID txn and controls what to share to whom • Ultimate Decentralization: If all ID txn are self-sovereign, tens of billions of Data Subjects gain full control over their identities • New Economy: The emergence of identity ownership will empower new economy / capitalism Future SSI Model Self-Sovereign Identity User / Data Subject intermediates id transaction Verifier / Searcher ( 2 ) D a t a S u b j e c t r e q u e s t s I s s u e r ( s ) f o r t h e i r d a t a (1) Searcher / Verifier requests Data Subject for their info
  • 18. Notable Technologies How to enable Decentralized Identity
  • 19. CONFIDENTIAL Verifiable Credentials empowers decentralized triangle of trust via cryptographic proof • Credential: A set of claims (attributes about Data Subject) made by an Issuer. Like “record” or “row” • Verifiable Credential: Credential that is digitally signed by Issuer and can be cryptographically verified • Cryptographic Proof: Issuer signs cred with its private key. Verifier verifies cred with Issuerʼs public key • Issuer vs. Holder Signatures: Holder/Presenter aggregates creds into a presentation and signs it • Transitive Trust: Verifier can trust a credential without interacting with the Issuer. Decouple Data, Trust, Access Verifiable Credentials
  • 20. CONFIDENTIAL Presentation is an aggregate of one or more credentials that represents a persona or a facet of an identity • Verifiable Presentation: A presentation doc digitally signed and attested by the Holder (e.g. Presenter) • Decentralized Aggregation: Localized data aggregation by Data Subject / Userʼs identity wallet • Selective Disclosure: The ability of Holder to make fine-grained decisions about what information to share • Zero-Knowledge Proof: Prove that something is true without conveying any additional information • Privacy Recommender: Recommend what to share to whom, when, and where Verifiable Presentation
  • 21. CONFIDENTIAL Identifier is the name of an entity. Unique identifier uniquely identifies an entity and enables its existence • Decentralized Identifiers (DIDs): A new unique identifier that doesnʼt require a centralized registration authority and is often generated cryptographically • Self-Sovereign Control: Enable Controller or Subject to prove control without requiring 3rd-party permission • Cryptographic Proof: Signer signs DID with its private key. Verifier verifies cred with Signerʼs public key • Distributed Ledger: “Blockchain” tech often used as verifiable data registries where the DIDs are recorded • DIDComm: Communication protocol built atop of DIDs Decentralized Identifier
  • 22. CONFIDENTIAL Entity Resolution creates a digital identity by connecting records referring to the same entity across different sources • Record Matching: Compare and decide whether two records refer to the same entity • Record Linking: Create and assign an unique identifier to records and connect them together • Horizontal Linking: Linking where all info required to generate an identifier is within a row or record. Ex: Phone IDs or Address IDs • Vertical Linking: Linking where info required to generate an identifier is not contained solely within its own row. Ex: Person IDs Entity Resolution
  • 23. CONFIDENTIAL Authentication creates and/or proves the linkage between a physical identity and a digital identity • Multi-Factor Authentication: Multiple evidences across different dimensions ensure higher security • Inherence Factors: Who you are. Ex: Facial biometrics, fingerprint, voice authentication, typing behaviors, … • Knowledge Factors: What you know. Ex: Password, secret phrase, Knowledge-Based Authentication, … • Possession Factors: What you have. Ex: SMS One-Time Passcode, Email Verification, Hardware Security Key, … • Location Factors: Where you are • Proxy Factors: Trust authn. done by 3rd parties Authentication
  • 24. Learn More Follow me @theCEODad or @Tang_Toks Follow @Spokeo, and check out Spokeo.com/Careers