blockchain perspective - internet of memorable things
Post on 22-Jan-2018
960 Views
Preview:
TRANSCRIPT
What is Blockchain and what types are there?
What is an Identity and how we manage it.
Identity Data - Storage, Protection, Visualization.
Ledgers and Identity Axioms 4
1
2
3
Program
The Future of Blockchains in IoT5
• Internet of past to present
• IoT Infrastructure
• Security Keys (Public and Private)
• Smart City Applications
• International Systems
• Mobile and Fixed Radio Solutions
• Security Automation
• Machine to Machine
• Creating and Accessing Data
• Legacy Walled Gardens
• Proprietary Legacy Systems
• Big Data Analytics $$
• Authorities
• Law and Standards
• Data Sovereignty
• Universal Identity
• Privacy
It’s All About Communications
M2M and IOT integrates with all industries
• Safeguards for Privacy rights of devices and data
• Data Mass
• Duplication
• Cost
• Accessibility
• Integration
• Ownership
• Bandwidth
• Identity
• Location
More Integration – More Complexity
• Increased interest and investment form Governments and Business (DHS, NIST)
• User Centric World of ID Management driven by breaches of data (OPM, IRS, Target, others)
• IoT device integration with Public Safety LTE Networks
• Increase productivity by interoperability with M2M
• International Startups in the space (All countries)
• No single point failure or proven demise of the protocol
• Physical to digital asset prototypes gaining exposure (Ascribe/Art, Bitnation/Refugees,
Everledger/Diamonds)
• IBM and Microsoft, Linux diving in headstrong (IBM 40k lines of code)
Indicators of a Paradigm Shift to Blockchain
• A blockchain is a simple digital platform for recording and verifying transactions so that other people can’t
erase them later and anyone can see them. “You can think of the blockchain of an ‘append-only’ ledger.
You can only write to it, you can’t delete it,” Peter van Valkenburg
• At its heart, blockchain is a self-sustaining, peer-to-peer database technology for managing and recording transactions with no central authority. Because blockchain verification is handled through algorithms and consensus among multiple computers, the system is presumed immune to tampering, fraud, or political control. It is designed to protect against domination of the network by any single computer or group of computers.
• The blockchain is designed to make transactions safe and reliable even if the people doing them don’t trust each other.
• At its core, a blockchain is a special type of data structure. The blocks within the chain contain data, but this does not make it a database; at best the blocks represent the transaction log of a specific database implementation.
• The distributed ledger technology that started with a cryptocurrency is rapidly becoming a crowd sourced system for all types of verification for devices, software, notary publics, voting systems, and the way banks manage transactions.
Blockchain
• Another simple way to look at Blockchains is that they
resemble the first memory chip in a computer.
• The processor would write to memory and then go
back to it to recover it’s state.
Pretty basic, but envision the processor and every other
part of a computer and put it into memory or ”blockchains”.
Every known thing can be recorded in a universal and
distributed blockchain memory ledger for future reference.
As volume and complexity of interacting things increases,
the locating and naming of these objects in memory is more
critical.
Blockchain is Memory
• Blockchain 1.0 Currency and Payments
• Blockchain 2.0 Smart Contracts, Programmable Assets, Decentralized Autonomous Entities
• Blockchain 3.0 Non-Economic Applications (Art, health, education, public good, and communications
• Etherium (Ether, Own Blockchain, Codius (blockchain agnostic platform), Oracles, Smart Contracts )
• Ripple ( Financial Settlement, Permissioned Ledgers, distributed consensus)
• Blockstream (Sidechains, colored coins, Hybrid, supports Lightning )
• MIT Enigma (Developmental, coinless)
• Factom (Hashed digtal assets to blockchain)
• Auger
Off Chain or On Chain Transactions and storage of data
Blockchain Bloat
Permissioned (Trusted Parties) or Permissionless (Trustless..ie bitcoin)
Blockchain and Protocols
• Life
• Government
• Social
• Hardware
• Biometric
• Assets
• Social
• Education
• Multiple Identity Identifiers (Phone, Wearable, Location, Biometric, etc.)
Moving Data from the File Cabinet to Digital Lockers
Identity Management
• Blockchains can safeguards the privacy rights of individuals in relation to the processing of personal data by:
regulating computer application use
giving individuals rights in relation to their personal information
imposing responsibilities on organisations in terms of compliance with the Data Protection rules and rights of access
• Data Protection Acts 1988 & 2003 create rights for individuals and responsibilities for computer and other users.
• When you create a record which contains personal data not only should it remain confidential but you are also obliged to keep it safe and secure and use it only for the purpose for which it was collected.
• Safe Harbor – EU new laws effecting transport and storage of PII
• Privacy Laws being revisited by FTC, FCC, or let’s just say every government business and agency!!!
• Insurance Liability
• Cost to secure or anonymise data
PII and Device Data
• Safeguards the privacy rights of devices in relation to the….
RF Communications
Location
Registries, Registrars
• Data Mass
• Duplication
• Cost
• Access
• Integration
• Containers
• Storage
• Exploitation
• Right to be forgotten
IoT Data
Every tag or label can now be unique
• Labels
• Tags
• IPv4, Ipv6
• Profile
• Tracking
• NFC
• RFID
• Standards
• Interoperability
• Persistence
• Technology
• Unique GUID
• Global
• Securing Stock
We do all these things in silos today. Blockchains can connect all these “tags”
Identification
Definitions of Value are diverse and broad and not always fiat based.
Ledgers can track:
• Coupons
• Travel Miles
• Vouchers
• Liberty Bell Stamp
• Bitcoin, Altchains, Ether?
• Tokens
• Game Credits
• Virtual game merchandise
Attributes to consider:
Dilution
Authority
Sustainability
Interoperability
Liquidity
Trust
Social Standard
Mobile – Ease of use
Financial standards and audibility
From Crypto Currencies to Storage of Value
• Facilities
• Smart Devices
• SaaS Products
• 3D to 5D Design
• Location, Space, and Time
• Design to Living Use Documents
• Living Buildings with Citizens, Government, and Owners
• Infrastructure Data Management
• Citizen Interoperability
• Cradle to Grave Device Management
• M2M Interoperability
• Protocol and Standards
• RF Frequencies and prioritization
• Proprietary and Open Source Systems
• Payment Gateways
• Inspections
• Open Data
Digital Demarcs – UID’s
• Silos and Walled Gardens
• Cloud(s)
• Governments
• Blockchains/Sidechains
• Municipal Data (Open Data Initiative)
• Ownership
• Provenance
• Common Attributes
• Over Time
• Containers and storage
To maximize the chance of data correctness it is absolutely necessary to provide independent governance, supported by process and procedure, to manage data validation, entry, review and correction.
• User Updates (No central secure repository, Fragmented Data)
• Duplication of Bad Data
• Alteration of data by bad actors
• API’s (Outdated and costly to continuously update)
Data, Quality and Persistence
• Fintech (Securities, Settlements, FX Markets etc.)
• Linux Foundation (IBM, Microsoft, R3)
• NISC (Oath.., OpenID, )
• Kantera Initiative (Interledger, UMA)
• IBM (ADEPT)
• Microsoft Azure ( Etherium/Consensys, BlockApps Strato )
• Governments (Honduras, Japan, …All)
• Ascribe (Art, Assets, Copyrights)
Blockchain Developments
[ Image information in product ]
Image : www.themegallery.com
Note to customers : This image has been licensed to be used within this PowerPoint template only.
You may not extract the image for any other use.
Hyperledger
• Several studies have shown the organization that digital transactions within the next
four years will net $9.5 USD billion in capital, and global blockchain technology
investments will reach close to $300 billion
• DHS (Blockchain RFI)
• Banking R3 consortium (50m+, 50+ Financial Institutions)
• Blockstream 75m
Over one billion invested in Blockchain companies in 2015
Blockchain Investments
• US Smart City Applications
Transit, Parking, Vehicles
Vouchers, Welfare, Coupons,
IoT Devices
Services
Utilities
Healthcare
Public Safety
Open Data
Use Tax
• B2B, B2G, C2G, C2B
• Estimates seeking to quantify the size of this untapped market are so far scarce, though Wedbush Securities has forecasted micropayments could be a $925bn market by 2025.
Micropayment – Tokens
• Real Estate
• Commodities
• Jewellery
• Titles, Deeds, Wills
• Airplanes and automobiles
• Stocks, Bonds, Securities
• Toll Roads
• Works of Art
• One of the more unique projects innovating in this area is Mediachain, a newly launched metadata protocol that allows digital creators to attach information to their creative works, timestamp that data to the blockchainand store it with the InterPlanetary File System (IPFS), a distributed file system incorporating aspects of blockchain technology.
Digitization of Assets
Neo4j is a highly scalable, robust (fully ACID) native graph database. Neo4j is used in mission-critical apps by
thousands of leading startups, enterprises, and governments around the world.
The emergence of the Cloud, as the modern data
center, has given rise to newer and more powerful system
architectures that allow systems to leverage multiple compute
nodes operating in parallel. These architectures support the
ubiquitous nature of data in the Smart Grid.
• Graph Databases – Neo4j (AGPL License)
• Geo and Social Graph capable
• 12 Billion Nodes +
• Transparent Partitioning (Neo4j 2.0)
• Dataset Replication
Relationships - Graph Database
• Sidechains are blockchains that are interoperable with each other and with Bitcoin, avoiding liquidity
shortages, market fluctuations, fragmentation, security breaches and outright fraud associated with
alternative crypto-currencies.
• Bitcoin transactions are stored in a financial ledger, called the blockchain. It is secured by a powerful
distributed hashing network. A sidechain is a blockchain that validates data from other blockchains and
enables bitcoins and other assets to be transferred between blockchains fostering a new , open platform for
innovation a development.
• The use of a two-way peg enables Bitcoins and other assets to be tranferred between chains in a fixed or
otherwise deterministic exchange rate. A pegged sidechain is a sidechain whose assets can be imported
from and returned to other sidechains. Sidechains allow the blockchain to be enhanced with better
performance and privacy protections. They also enable new extensions to support myriad asset classes
like stocks, bonds, derivatives, and real/ or virtual world currencies as well as to add capabilities like smart
contracts, secure handles and real-world property registries.
Sidechains
• Smart contracts are protocols that facilitate, verify, or enforce the negotiation or
performance of a contract, or that make a contractual clause unnecessary.
• Smart contracts usually also have a user interface and often emulate the logic of
contractual clauses.
• Proponents of smart contracts believe that many kinds of contractual clauses may
thus be made partially or fully self-executing, self-enforcing, or both.
• Smart contracts aim to provide security superior to traditional contract law and to
reduce other transaction costs associated with contracting.
Every entity, authority, object, place , and time are needed to facilitate any smart contract.
These are outside inputs to the algorithm or process embedded in the living smart contract.
Smart Contracts
• An important aspect of smart cities is the so called Internet of Things (IoT). What they do
not mention is the downside of all these data gathering sensor based devices. By building
the transactions on a blockchain and adding smart contracts, the devices become
secure, private and anonymous by design. IBM defines this as “Device Democracy” in
which they state that devices and their owners and users should themselves control their
privacy and security.
• “Smart cities represent a great revenue opportunity for technology and services providers
(TSPs)”, and a little further: “While investment in IoT hardware is fundamental for smart
cities, the real revenue opportunity for TSPs is in the services and analytics sector”-
Gartner
• A lot of smart city projects are public-private-partnerships. The government (municipality)
should take responsibility for the long term wellbeing of citizens in terms of privacy,
transparency and security by adopting a framework and setting minimum requirements
for TSP’s.
Smart Cities
App Security
Server Side Apps
Zero Client Mobile Devices
Encryption End to End
Rapid Provisioning
Safe Data
Securely Access your all computing Data & Software Apps Anywhere, Anytime, on Any Device
Thick, Thin, Mobile, Zero Clients
Chains
Block
ChainsSide
Chains
Bitcoin
Business
Etherium
Ripple
BYOB
Medical
Financial
EDU
Identity transpires across all industry chains
Interoperability
BlockchainPermissionless
Private
Blockchain
Business
Blockchain
Supplier
Blockchain
Product
Blockchain
Asset
Ledger
Vendor
Ledger
Inventory
Ledger
Permissioned
Direct access to user centric data
One to many persistent data service
Identity Portals
Identity Management
Creation of Authenticated Unique Identities
Blockchain
A user centric identity management ecosystem designed to
bridge all architectures through identity using blockchain
technology.
What would an identity solution require
to meet the future needs?
1. The ability to create unique, unduplicatable identities for every
entity, object, and device in the world. (infinitely scalable)
2. Maintain entity's ownership of identity and information.
3. A decentralized, distributed protected place to access, store, and
manage data.
4. A completely non-biased system agnostic platform.
Ultimatum
The world needs an universal identity platform that provides a unique
identity reference providing true persistent data over time and
ownership of information.
Data systems need to be efficient and reference a common identity
to meet the future demands of big data and the internet of things.
BridgeIdentity Offerings to Individuals:
• Attach any identity and information to their unique id
• Determine their information’s level of protection
• Update information only once (Persistent Data)
• Allow access to their information to other parties. (Smartphone ID)
• Sell their own information for use and revenue
• Establish ownership of devices with identity
• Opt In and Out through their identity
• Human-meaningful: Meaningfulness and memorability to the users.
• Decentralized: No need of a centralized authority for determining the meaning of a name.
• Secure: There is one, unique and specific entity to which the name applies.
Memorable Use - Zooko’s Triangle - Squared
https://en.wikipedia.org/wiki/Zooko%27s_triangle
+ Blockchains =
Example of memorable: Hotels.com, Cars.com, Business.com
MyHoteliD.com, MyVehicleID.com, MyBusinessID.com
Result: Unique and Memorable Identity Name Portals for each Identity
• Personnel data collection and program
administration.
• Biometric authentication and acceptance of valid
TWIC cardholders without time and cost of
additional background screening.
• Identity document verification, photo capture and
authorization-form management.
• Supervision of independent, third-party personal
identity verification and criminal history background
screening vendors.
• Production and delivery of membership ID Cards.
• Secure Web-based information management
system.
• Daily search of terrorist watch lists.
• Maximum privacy protection.
MyTWICID.com
MyPIVID.com
MyCACID.com
MyFRACID.com
MyBorderID.com
MyMilitaryID.com
MyGovernmentID.com
MyImagrantID.com
MyIrisID.com
MyEyeID.com
MySpeechID.com
MyBackgroundID.com
MyContractorID.com
MyVendorID.com
MyPrivacyID.com
MyMembershipID.com
MyInternationalID.com
MyNationalID.com
MyPassportID.com
MyBiometricID.com
Authentication
• Maintaining current training records and
certifications.
• Alerting department members and/or training
officers of expiring certifications.
• Optimally deploying responders to critical
incident scenes based on verifiable skillsets.
• Authenticating mutual-aid responders to verify
qualifications prior to allowing access to
hazardous environments.
• Ensuring only authorized personnel enter an
incident scene.
• Providing a secure, managed service that is
accessible from anywhere.
MyPoliceID.com
MyFiremanID.com
MyResponderID.com
MyHealthcareIID.com
MyVolunteerID.com
MyCiteID.com
MyCitizenID.com
MyCivilID.com
MyMilitaryID.com
MyGovernmentID.com
MyFederalID.com
MyRadioID.com
MyGPSID.com
MyDeviceID.com
MyPropertyID.com
MyBadgeID.com
MyCameraID.com
MyWi-FiID.com
Public Safety
University ID/Raider Card
Education
You
r
Mes
sa
ge
Here
16:59
MyCampusID.com
MySchoolID.com
MyTeacherID.com
MyUniversityID.com
MyStudentID.com
MyParentID.com
MyVehicaID.com
MyParkingID.com
MyGymID.com
MyLoginID.com
MyBikeID.com
MyEmergencyID.com
MyTranscriptID.com
MyUniversityID.com
MyBookID.com
MyE-BookID.com
MyWearableID.com
Access
Control
Cloud Card Production
Login -BYOD
Mobile Digital ID’s
Integrated Apps
Local Discounts
Books
Transcripts
Healthcare
MyHealthcareID.com
MyMedicalID.com
MyPatientID.com
MyDonorID.com
MyDoctorID.com
MyMedicareID.com
MyMedicaidID.com
MyEmergencyID.com
MyDentalID.com
MyGeneticID.com
MyInfantID.com
MyBirthID.com
MyEDeviceID.com
MyPictureID.com
MyMonitorID.com
MyInsuranceID.com
MyPharmacyID.com
MyChildID.com
MyDaycareID.com
MyChildcareID.com
MyPhysicianID.com
Healthcare information protection
and online access laws are a driving
force behind BridgeIDentity. Direct
access to medical records, hospitals,
doctors, pharmacies, and
government services are in the very
near future for all individuals,
companies, and healthcare providers.
This precedence will set a guiding
path of technology used to access
confidential information through
secure interactive portals.
Smart Grid – Customer - Commercial
MyMeterID.com
MySmartGridID.com
MyGridID.com
MySmartcarID.com
MySmarthomeID.com
MyTagID.com
MySensorID.com
MySmartMeterID.com
MyEquipmentID.com
MyLocationiD.com
MyEDeviceID.com
MyM2MID.com
MyCameraID.com
MyMonitorID.com
MyRadioID.com
MySubscriberID.com
MyRouterID.com
MyIPv4ID.com
MyIPv6ID.com
Sample Data Funnel Example
Authenticated Data Providers can funnel data into blockchains creating recurring revenue.
Users can get paid for research use of their data as well though micropayments.
• Promote quality of services through blockchain interoperability and not merely a duplication of fragmented legacy systems and services.
• Promote user centric applications with ease of use.
• Develop an ecosystem of collaboration between all entities.
• Work with incubators, startups, and business development in this space
• Partner with visionaries that grasp the depth of this new technology and harness it’s power.
• Utilize this technology to save energy and lives.
Where are we going from here?
top related