51
Internet of Memorable Things Blockchain Perspective

Blockchain Perspective - Internet of Memorable Things

Embed Size (px)

Citation preview

Internet of Memorable Things

Blockchain

Perspective

What is Blockchain and what types are there?

What is an Identity and how we manage it.

Identity Data - Storage, Protection, Visualization.

Ledgers and Identity Axioms 4

1

2

3

Program

The Future of Blockchains in IoT5

• Internet of past to present

• IoT Infrastructure

• Security Keys (Public and Private)

• Smart City Applications

• International Systems

• Mobile and Fixed Radio Solutions

• Security Automation

• Machine to Machine

• Creating and Accessing Data

• Legacy Walled Gardens

• Proprietary Legacy Systems

• Big Data Analytics $$

• Authorities

• Law and Standards

• Data Sovereignty

• Universal Identity

• Privacy

It’s All About Communications

IBM 2016

Centralized to Decentralized Network of Things

M2M and IOT integrates with all industries

• Safeguards for Privacy rights of devices and data

• Data Mass

• Duplication

• Cost

• Accessibility

• Integration

• Ownership

• Bandwidth

• Identity

• Location

More Integration – More Complexity

• Increased interest and investment form Governments and Business (DHS, NIST)

• User Centric World of ID Management driven by breaches of data (OPM, IRS, Target, others)

• IoT device integration with Public Safety LTE Networks

• Increase productivity by interoperability with M2M

• International Startups in the space (All countries)

• No single point failure or proven demise of the protocol

• Physical to digital asset prototypes gaining exposure (Ascribe/Art, Bitnation/Refugees,

Everledger/Diamonds)

• IBM and Microsoft, Linux diving in headstrong (IBM 40k lines of code)

Indicators of a Paradigm Shift to Blockchain

• A blockchain is a simple digital platform for recording and verifying transactions so that other people can’t

erase them later and anyone can see them. “You can think of the blockchain of an ‘append-only’ ledger.

You can only write to it, you can’t delete it,” Peter van Valkenburg

• At its heart, blockchain is a self-sustaining, peer-to-peer database technology for managing and recording transactions with no central authority. Because blockchain verification is handled through algorithms and consensus among multiple computers, the system is presumed immune to tampering, fraud, or political control. It is designed to protect against domination of the network by any single computer or group of computers.

• The blockchain is designed to make transactions safe and reliable even if the people doing them don’t trust each other.

• At its core, a blockchain is a special type of data structure. The blocks within the chain contain data, but this does not make it a database; at best the blocks represent the transaction log of a specific database implementation.

• The distributed ledger technology that started with a cryptocurrency is rapidly becoming a crowd sourced system for all types of verification for devices, software, notary publics, voting systems, and the way banks manage transactions.

Blockchain

• Another simple way to look at Blockchains is that they

resemble the first memory chip in a computer.

• The processor would write to memory and then go

back to it to recover it’s state.

Pretty basic, but envision the processor and every other

part of a computer and put it into memory or ”blockchains”.

Every known thing can be recorded in a universal and

distributed blockchain memory ledger for future reference.

As volume and complexity of interacting things increases,

the locating and naming of these objects in memory is more

critical.

Blockchain is Memory

IBM 2016

Number of Projected IoT Devices

Forcing Universal Identity Platform.

• Blockchain 1.0 Currency and Payments

• Blockchain 2.0 Smart Contracts, Programmable Assets, Decentralized Autonomous Entities

• Blockchain 3.0 Non-Economic Applications (Art, health, education, public good, and communications

• Etherium (Ether, Own Blockchain, Codius (blockchain agnostic platform), Oracles, Smart Contracts )

• Ripple ( Financial Settlement, Permissioned Ledgers, distributed consensus)

• Blockstream (Sidechains, colored coins, Hybrid, supports Lightning )

• MIT Enigma (Developmental, coinless)

• Factom (Hashed digtal assets to blockchain)

• Auger

Off Chain or On Chain Transactions and storage of data

Blockchain Bloat

Permissioned (Trusted Parties) or Permissionless (Trustless..ie bitcoin)

Blockchain and Protocols

• Life

• Government

• Social

• Hardware

• Biometric

• Assets

• Social

• Education

• Multiple Identity Identifiers (Phone, Wearable, Location, Biometric, etc.)

Moving Data from the File Cabinet to Digital Lockers

Identity Management

• Blockchains can safeguards the privacy rights of individuals in relation to the processing of personal data by:

regulating computer application use

giving individuals rights in relation to their personal information

imposing responsibilities on organisations in terms of compliance with the Data Protection rules and rights of access

• Data Protection Acts 1988 & 2003 create rights for individuals and responsibilities for computer and other users.

• When you create a record which contains personal data not only should it remain confidential but you are also obliged to keep it safe and secure and use it only for the purpose for which it was collected.

• Safe Harbor – EU new laws effecting transport and storage of PII

• Privacy Laws being revisited by FTC, FCC, or let’s just say every government business and agency!!!

• Insurance Liability

• Cost to secure or anonymise data

PII and Device Data

• Safeguards the privacy rights of devices in relation to the….

RF Communications

Location

Registries, Registrars

• Data Mass

• Duplication

• Cost

• Access

• Integration

• Containers

• Storage

• Exploitation

• Right to be forgotten

IoT Data

Every tag or label can now be unique

• Labels

• Tags

• IPv4, Ipv6

• Profile

• Tracking

• NFC

• RFID

• Standards

• Interoperability

• Persistence

• Technology

• Unique GUID

• Global

• Securing Stock

We do all these things in silos today. Blockchains can connect all these “tags”

Identification

Definitions of Value are diverse and broad and not always fiat based.

Ledgers can track:

• Coupons

• Travel Miles

• Vouchers

• Liberty Bell Stamp

• Bitcoin, Altchains, Ether?

• Tokens

• Game Credits

• Virtual game merchandise

Attributes to consider:

Dilution

Authority

Sustainability

Interoperability

Liquidity

Trust

Social Standard

Mobile – Ease of use

Financial standards and audibility

From Crypto Currencies to Storage of Value

• Facilities

• Smart Devices

• SaaS Products

• 3D to 5D Design

• Location, Space, and Time

• Design to Living Use Documents

• Living Buildings with Citizens, Government, and Owners

• Infrastructure Data Management

• Citizen Interoperability

• Cradle to Grave Device Management

• M2M Interoperability

• Protocol and Standards

• RF Frequencies and prioritization

• Proprietary and Open Source Systems

• Payment Gateways

• Inspections

• Open Data

Digital Demarcs – UID’s

• Silos and Walled Gardens

• Cloud(s)

• Governments

• Blockchains/Sidechains

• Municipal Data (Open Data Initiative)

• Ownership

• Provenance

• Common Attributes

• Over Time

• Containers and storage

To maximize the chance of data correctness it is absolutely necessary to provide independent governance, supported by process and procedure, to manage data validation, entry, review and correction.

• User Updates (No central secure repository, Fragmented Data)

• Duplication of Bad Data

• Alteration of data by bad actors

• API’s (Outdated and costly to continuously update)

Data, Quality and Persistence

• Fintech (Securities, Settlements, FX Markets etc.)

• Linux Foundation (IBM, Microsoft, R3)

• NISC (Oath.., OpenID, )

• Kantera Initiative (Interledger, UMA)

• IBM (ADEPT)

• Microsoft Azure ( Etherium/Consensys, BlockApps Strato )

• Governments (Honduras, Japan, …All)

• Ascribe (Art, Assets, Copyrights)

Blockchain Developments

[ Image information in product ]

Image : www.themegallery.com

Note to customers : This image has been licensed to be used within this PowerPoint template only.

You may not extract the image for any other use.

Hyperledger

• Several studies have shown the organization that digital transactions within the next

four years will net $9.5 USD billion in capital, and global blockchain technology

investments will reach close to $300 billion

• DHS (Blockchain RFI)

• Banking R3 consortium (50m+, 50+ Financial Institutions)

• Blockstream 75m

Over one billion invested in Blockchain companies in 2015

Blockchain Investments

• US Smart City Applications

Transit, Parking, Vehicles

Vouchers, Welfare, Coupons,

IoT Devices

Services

Utilities

Healthcare

Public Safety

Open Data

Use Tax

• B2B, B2G, C2G, C2B

• Estimates seeking to quantify the size of this untapped market are so far scarce, though Wedbush Securities has forecasted micropayments could be a $925bn market by 2025.

Micropayment – Tokens

• Real Estate

• Commodities

• Jewellery

• Titles, Deeds, Wills

• Airplanes and automobiles

• Stocks, Bonds, Securities

• Toll Roads

• Works of Art

• One of the more unique projects innovating in this area is Mediachain, a newly launched metadata protocol that allows digital creators to attach information to their creative works, timestamp that data to the blockchainand store it with the InterPlanetary File System (IPFS), a distributed file system incorporating aspects of blockchain technology.

Digitization of Assets

Energy Sharing

Neo4j is a highly scalable, robust (fully ACID) native graph database. Neo4j is used in mission-critical apps by

thousands of leading startups, enterprises, and governments around the world.

The emergence of the Cloud, as the modern data

center, has given rise to newer and more powerful system

architectures that allow systems to leverage multiple compute

nodes operating in parallel. These architectures support the

ubiquitous nature of data in the Smart Grid.

• Graph Databases – Neo4j (AGPL License)

• Geo and Social Graph capable

• 12 Billion Nodes +

• Transparent Partitioning (Neo4j 2.0)

• Dataset Replication

Relationships - Graph Database

• Sidechains are blockchains that are interoperable with each other and with Bitcoin, avoiding liquidity

shortages, market fluctuations, fragmentation, security breaches and outright fraud associated with

alternative crypto-currencies.

• Bitcoin transactions are stored in a financial ledger, called the blockchain. It is secured by a powerful

distributed hashing network. A sidechain is a blockchain that validates data from other blockchains and

enables bitcoins and other assets to be transferred between blockchains fostering a new , open platform for

innovation a development.

• The use of a two-way peg enables Bitcoins and other assets to be tranferred between chains in a fixed or

otherwise deterministic exchange rate. A pegged sidechain is a sidechain whose assets can be imported

from and returned to other sidechains. Sidechains allow the blockchain to be enhanced with better

performance and privacy protections. They also enable new extensions to support myriad asset classes

like stocks, bonds, derivatives, and real/ or virtual world currencies as well as to add capabilities like smart

contracts, secure handles and real-world property registries.

Sidechains

• Smart contracts are protocols that facilitate, verify, or enforce the negotiation or

performance of a contract, or that make a contractual clause unnecessary.

• Smart contracts usually also have a user interface and often emulate the logic of

contractual clauses.

• Proponents of smart contracts believe that many kinds of contractual clauses may

thus be made partially or fully self-executing, self-enforcing, or both.

• Smart contracts aim to provide security superior to traditional contract law and to

reduce other transaction costs associated with contracting.

Every entity, authority, object, place , and time are needed to facilitate any smart contract.

These are outside inputs to the algorithm or process embedded in the living smart contract.

Smart Contracts

• An important aspect of smart cities is the so called Internet of Things (IoT). What they do

not mention is the downside of all these data gathering sensor based devices. By building

the transactions on a blockchain and adding smart contracts, the devices become

secure, private and anonymous by design. IBM defines this as “Device Democracy” in

which they state that devices and their owners and users should themselves control their

privacy and security.

• “Smart cities represent a great revenue opportunity for technology and services providers

(TSPs)”, and a little further: “While investment in IoT hardware is fundamental for smart

cities, the real revenue opportunity for TSPs is in the services and analytics sector”-

Gartner

• A lot of smart city projects are public-private-partnerships. The government (municipality)

should take responsibility for the long term wellbeing of citizens in terms of privacy,

transparency and security by adopting a framework and setting minimum requirements

for TSP’s.

Smart Cities

App Security

Server Side Apps

Zero Client Mobile Devices

Encryption End to End

Rapid Provisioning

Safe Data

Securely Access your all computing Data & Software Apps Anywhere, Anytime, on Any Device

Thick, Thin, Mobile, Zero Clients

Chains

Block

ChainsSide

Chains

Bitcoin

Business

Etherium

Ripple

BYOB

Medical

Financial

EDU

Identity transpires across all industry chains

Interoperability

BlockchainPermissionless

Private

Blockchain

Business

Blockchain

Supplier

Blockchain

Product

Blockchain

Asset

Ledger

Vendor

Ledger

Inventory

Ledger

Permissioned

Direct access to user centric data

One to many persistent data service

Identity Portals

Identity Management

Creation of Authenticated Unique Identities

Blockchain

A user centric identity management ecosystem designed to

bridge all architectures through identity using blockchain

technology.

Global Identity Ecosystem

Play Video Presentation

What would an identity solution require

to meet the future needs?

1. The ability to create unique, unduplicatable identities for every

entity, object, and device in the world. (infinitely scalable)

2. Maintain entity's ownership of identity and information.

3. A decentralized, distributed protected place to access, store, and

manage data.

4. A completely non-biased system agnostic platform.

Ultimatum

The world needs an universal identity platform that provides a unique

identity reference providing true persistent data over time and

ownership of information.

Data systems need to be efficient and reference a common identity

to meet the future demands of big data and the internet of things.

BridgeIdentity Offerings to Individuals:

• Attach any identity and information to their unique id

• Determine their information’s level of protection

• Update information only once (Persistent Data)

• Allow access to their information to other parties. (Smartphone ID)

• Sell their own information for use and revenue

• Establish ownership of devices with identity

• Opt In and Out through their identity

• Human-meaningful: Meaningfulness and memorability to the users.

• Decentralized: No need of a centralized authority for determining the meaning of a name.

• Secure: There is one, unique and specific entity to which the name applies.

Memorable Use - Zooko’s Triangle - Squared

https://en.wikipedia.org/wiki/Zooko%27s_triangle

+ Blockchains =

Example of memorable: Hotels.com, Cars.com, Business.com

MyHoteliD.com, MyVehicleID.com, MyBusinessID.com

Result: Unique and Memorable Identity Name Portals for each Identity

Sample Block Diagram

• Personnel data collection and program

administration.

• Biometric authentication and acceptance of valid

TWIC cardholders without time and cost of

additional background screening.

• Identity document verification, photo capture and

authorization-form management.

• Supervision of independent, third-party personal

identity verification and criminal history background

screening vendors.

• Production and delivery of membership ID Cards.

• Secure Web-based information management

system.

• Daily search of terrorist watch lists.

• Maximum privacy protection.

MyTWICID.com

MyPIVID.com

MyCACID.com

MyFRACID.com

MyBorderID.com

MyMilitaryID.com

MyGovernmentID.com

MyImagrantID.com

MyIrisID.com

MyEyeID.com

MySpeechID.com

MyBackgroundID.com

MyContractorID.com

MyVendorID.com

MyPrivacyID.com

MyMembershipID.com

MyInternationalID.com

MyNationalID.com

MyPassportID.com

MyBiometricID.com

Authentication

• Maintaining current training records and

certifications.

• Alerting department members and/or training

officers of expiring certifications.

• Optimally deploying responders to critical

incident scenes based on verifiable skillsets.

• Authenticating mutual-aid responders to verify

qualifications prior to allowing access to

hazardous environments.

• Ensuring only authorized personnel enter an

incident scene.

• Providing a secure, managed service that is

accessible from anywhere.

MyPoliceID.com

MyFiremanID.com

MyResponderID.com

MyHealthcareIID.com

MyVolunteerID.com

MyCiteID.com

MyCitizenID.com

MyCivilID.com

MyMilitaryID.com

MyGovernmentID.com

MyFederalID.com

MyRadioID.com

MyGPSID.com

MyDeviceID.com

MyPropertyID.com

MyBadgeID.com

MyCameraID.com

MyWi-FiID.com

Public Safety

University ID/Raider Card

Education

You

r

Mes

sa

ge

Here

16:59

MyCampusID.com

MySchoolID.com

MyTeacherID.com

MyUniversityID.com

MyStudentID.com

MyParentID.com

MyVehicaID.com

MyParkingID.com

MyGymID.com

MyLoginID.com

MyBikeID.com

MyEmergencyID.com

MyTranscriptID.com

MyUniversityID.com

MyBookID.com

MyE-BookID.com

MyWearableID.com

Access

Control

Cloud Card Production

Login -BYOD

Mobile Digital ID’s

Integrated Apps

Local Discounts

Books

Transcripts

Healthcare

MyHealthcareID.com

MyMedicalID.com

MyPatientID.com

MyDonorID.com

MyDoctorID.com

MyMedicareID.com

MyMedicaidID.com

MyEmergencyID.com

MyDentalID.com

MyGeneticID.com

MyInfantID.com

MyBirthID.com

MyEDeviceID.com

MyPictureID.com

MyMonitorID.com

MyInsuranceID.com

MyPharmacyID.com

MyChildID.com

MyDaycareID.com

MyChildcareID.com

MyPhysicianID.com

Healthcare information protection

and online access laws are a driving

force behind BridgeIDentity. Direct

access to medical records, hospitals,

doctors, pharmacies, and

government services are in the very

near future for all individuals,

companies, and healthcare providers.

This precedence will set a guiding

path of technology used to access

confidential information through

secure interactive portals.

Smart Grid – Customer - Commercial

MyMeterID.com

MySmartGridID.com

MyGridID.com

MySmartcarID.com

MySmarthomeID.com

MyTagID.com

MySensorID.com

MySmartMeterID.com

MyEquipmentID.com

MyLocationiD.com

MyEDeviceID.com

MyM2MID.com

MyCameraID.com

MyMonitorID.com

MyRadioID.com

MySubscriberID.com

MyRouterID.com

MyIPv4ID.com

MyIPv6ID.com

Identity Cluster Example

Identity Cluster Example

Frameworks E1

Frameworks E2

Identity Framework Example

Sample Data Funnel Example

Authenticated Data Providers can funnel data into blockchains creating recurring revenue.

Users can get paid for research use of their data as well though micropayments.

• Promote quality of services through blockchain interoperability and not merely a duplication of fragmented legacy systems and services.

• Promote user centric applications with ease of use.

• Develop an ecosystem of collaboration between all entities.

• Work with incubators, startups, and business development in this space

• Partner with visionaries that grasp the depth of this new technology and harness it’s power.

• Utilize this technology to save energy and lives.

Where are we going from here?

T h a n k Y o u !

L e t U s C r o s s T o g e t h e r