Remove Airlines Remove Authentication Remove Company Remove Licensing
article thumbnail

Digital identity startup Evernym sells to Avast, looks to bring trust to a decentralized internet

GeekWire

The movement is creating a massive cascade of venture capital dollars, and now Seattle-based Evernym — an 8-year-old startup with roots in Salt Lake City — is taking advantage of the wave of activity by selling to cybersecurity and antivirus software company Avast. Evernym describes itself as a leader in “self-sovereign identity.”

article thumbnail

Zero Trust with Zero Data

Phil Windley

driver's license) to prove your age when buying beer, we ran convenience stores like a web app. And if you wanted to buy beer, the company would have to proof the identity of the person to ensure they're over 21. Zero data stores less data that can be exploited by hackers (or the companies we trust with it ).

Data 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

Main constituents: Companies that control access to large blocks of data that can be useful to automated analysis. Companies are re-examining their APIs and setting up stronger controls. Some of the decisions are being swayed by the investment that the company has made in commercial office space.

Tools 136
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

For example, I may have a credential representing my drivers license and one representing my employee ID. Yet, because they're based on a metasystem and use a common protocol, I could go to the bank and use those in concert to prove that I'm employed (employee ID) and my date of birth (drivers license) at the same time in one operation.

System 87
article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Those are the two easy to understand checks.

Windows 45
article thumbnail

Generative Identity

Phil Windley

Maybe Alice uses it for passwordless login at company web sites and services and to purchase meals at the company cafeteria. She might also use it at partner websites (like the benefits provider) to provide shared authentication without federation (and it's associated infrastructure). Drivers license. Business licenses.