• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Blockchain in Digital Identity

By Abhishek Ghosh July 30, 2020 6:23 pm Updated on July 30, 2020

Blockchain in Digital Identity

Advertisement

With blockchain, individuals and machines can identify themselves in digital networks unambiguously in a tamper-proof manner. In many places, the COVID-19 pandemic praised the creativity of teachers when the school material was conveyed via or WhatsApp. The initiative is considerable, and it highlights the state of digitalization. After all, in an increasingly digital world, many companies are struggling with the problem of trust in digital commerce. Unfortunately, the question of a reliable identity and reliable information on the Internet has not yet been solved sustainably. The loss in online commerce as a result of identity fraud in 2018 amounted many billions. Unfortunately, the chip including digital signature on the card could not change this. The procedure did not prevail. Not even all government agencies adapted digital signature. Banking still relies on signature and 4 digit pin. Identification processes such as live photo can reach some users, with the disadvantage that they are problems to personal data disclosure. In addition to natural persons, things such as machines or legal persons and companies need a clear identification for further digitized processes. If you start research on identity, you inevitably stumble upon the terms:

  • Digital identity
  • Decentralized identity
  • Sovereign identity and
  • Blockchain
Blockchain in Digital Identity

 

Digital Identity

 

Digital identity identifies us on the Internet. But the solutions offered today are not very effective: a separate login must be created for each service. As a rule, this data set is supplemented by personal data and all this ends up in central data silos of the various companies. As a citizen or user, you have no control over your data and their use, nor can you access it directly. The result is a split identity in the network with redundant data. To make matters worse, the validity of allegations is difficult to verify. For example, each bank account must be verified, even though it has long since been carried out for another bank.

 

Self Sovereign Identity (SSI)

 

The catchphrase Self Sovereign Identity (SSI) is about personal sovereignty over one’s own identity in all matters both off and online. It is the responsibility of the individual to have a self-determined view of who is allowed to see or use which personal data for how long.

Advertisement

---

A sovereign identity could be more granular to determine who gets what information. This approach is in stark contrast to today’s usual approaches because it is decentralized in nature: the user manages his data completely without a central authority. Selective sharing guarantees a high level of privacy and sovereignty over its data. The solution to this problem could lie in the blockchain because the protocol enables a decentralized PKI infrastructure (public key infrastructure) and is thus the foundation for a self-sovereign identity or a decentralized identity.

 

Decentralized Identity as a Solution

 

The solution for a sovereign digital identity is the so-called decentralized identity. It acts as a universal key for all online applications – smartphones provide a bridge to the analogue world. This eliminates the individual registration on each website and the management of password and username. In contrast to the popular social logins of Facebook or Google, the data of the users does not lie on the central servers of these providers but remain in full control of the user. However, in many situations, participants in a transaction must be able to rely on the information provided. The car rental company must check the driver’s license before handing over the vehicle key. If it is only available in digital form, it must be able to trust this information. In the digital space, therefore, the question arises as to how a valid identity can be proven sustainably? A solution is needed that:

  • provides secure trust records in real-time and is easy to use;
  • tamper-proof;

Such a digital identity solution could benefit insurance companies, financial service providers, mobility, B2B trading or automotive. The decentralized identity is also particularly interesting for login to web applications and large social media platforms. The Decentralized Identity can serve as a kind of universal account for all web services – the management of password and user names is no longer necessary. Compared to the currently popular social login functions, this solution offers the advantage that the data of the user is not stored on a central server of Google, Facebook and Co. They remain under the sole control of the user. This protects privacy, less trust in third parties is needed.

 

Final Words

 

The users can control their decentralized identity which is free for re-use. This would allow the regulatory concerns of states such as users to be enforced against platforms such as Amazon, Facebook or Google: these companies generate revenue from their users’ data; they are de facto transforming their customers into a product. Regulators and politicians around the world are trying to bring these platforms under control, often with a focus on tax issues. The protection of privacy is lagging. With decentralized identities, states are given a means of collecting taxes while protecting the data of their citizens. This would require undertakings to offer access to the service with the digital identity as a minimum requirement and thus without discrimination. Any additional identity feature may, of course, be requested, for which the platform might have to pay, for example.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Blockchain in Digital Identity

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Decentralized Identity and Blockchain

    In our previous article, we discussed the basics on blockchain for Digital Identity. The outstanding features of blockchain technology are – Transparency, Immutability, Timestamp and Trust without the help of an intermediary. The blockchain protocol is good to use in two ways, first as a proof of authenticity and second for the backup mechanisms. In […]

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy