top of page

Cryptographically secure identification records that allow users to control third-party transmissions and visibility of personal data. Based on the blockchain, this solution could help individuals to regain ownership of their own data, as it would serve as a single personal identity.

While individuals currently have multiple online accounts enrolled with their identities, this blockchain-based solution allows individuals to concentrate their identities on one single source as the user login for several applications. Besides eliminating redundancies and increasing online security and privacy, this technological solution makes online processes and transactions seamless and more traceable in case of a data breach.

This protocol cryptographically secure identification records on the blockchain through a single identity source, and use it to communicate with several third-party institutions through a combination of QR code private key validation and biometric identification methods. The user's data is distributed in the blockchain without any single point of failure or vulnerability for attackers to exploit. Using a combination of cryptography and a blockchain ledger, anyone can verify an ID in real-time.

In an educational context, this technology could be a tool to combat student plagiarism and identity fraud, both of which have always existed in education. Online education especially suffers from these consequences, as teachers have limited interaction with students. A crypto-identity could give individuals a unique identifier at birth, which they could use to submit assignments online or at school, opening up the possibility of creating an anonymous world.

Regarding the right to be forgotten, however, self-sovereign identity (SSI) may not necessarily mean a person could have full rights to verify their own identity. Trusted authorities would be required to validate and issue the verified credentials. The industry standards for digital identity definitions and its interoperability mechanisms still need to be further developed.

Future Perspectives
Through a combination of encrypted identity and digital identity removal, it could be possible for someone to have their identity wholly protected. For this technology to function properly, it would have to be accepted across a variety of websites and institutions; this might prove to be difficult, as many of them actually profit from the shared data of their userbase.

Self-Sovereign Identity

KEY TRENDS

Cybersecurity