Newsroom

June 30
Preeti Rastogi | Principal Software Engineering Manager, Microsoft

Life Cycle of Identity

We are born without a name, we are born with an identity…

An identity that defines us, birth date and place that stamp us,

We grow, we interact, evolving our identity that now describes us!

 

We exchange information, we exchange data, we live in a world of data sharing,

We want to own our identity, we want to control our privacy in a world of hacking,

“Assume Breach” is the right approach, when all the “Threat Actors” are progressing,

No wonder, we are searching for a solution with privacy preserving!

 

Decentralized identity could be one promising solution,

Distributed ledgers could help build that foundation,

However, Scalability and Performance need some digging,

And that’s what Identity Overlay Network and Hedera Hashgraph sessions will be presenting!

 

DID Documents, DID Methods, Verifiable Credentials are defined in specifications,

Data Communication, Data exchange protocols are waiting on standardizations,

Decentralized Identity without standards and protocols is incomplete and lacking,

Distributed Open Identity: Self-sovereign OpenID session covers how SIOP could be supporting!

 

Despite the latest technologies, who can ensure the world will adopt this innovation,

Whether it becomes obsolete or leads to a new revolution,

Highlighting these unique challenges,

POC to Production – Launching an SSI Platform session is the right presentation!

 

We are born without a name, but born with an identity…

An identity that defines us, birth date and place that stamp us,

We grow, we interact, evolving our identity that now describes us,

An identity that’s born with us, and after we die, gets left behind us,

If you think IT needs to be protected, then join us to explore Decentralized Identity!!

View More Posts

There’s just too much to miss!

— Ian Glazer