Remove Applications Remove Authentication Remove Internet Remove Workshop
article thumbnail

Using X.509 Certs for DID Provenance

Phil Windley

At the most recent Internet Identity Workshop , Drummond Reed gave a session on how X.509 509 certificate for that endpoint, including in the application the DID they created in (1). For that, they need to take the issuer's decentralized identifier (DID) that they got from credential presentation and determine who it belongs to.

Data 83
article thumbnail

Ready or not, IoT is transforming your world

Dataconomy

The Internet of Things (IoT), a revolutionary network of interconnected devices and systems, is propelling us into a new era of possibilities. Internet of Things (IoT), has brought about revolutionary changes to the way we live, work, and interact with our surroundings.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Dick Hardt has often been “early to the new,” as he puts it: Microsoft Windows in 1986, neural networks in 1989, the internet in 1993, open source in 1995, and even Burning Man in 1999. “The internet does not have an identity layer,” said Hardt, our latest Geek of the Week. back in 2005.

Internet 107
article thumbnail

Identity, Sovrin, and the Internet of Things

Phil Windley

Summary: Building the Internet of Things securely requires that we look to non-hierarchical models for managing trust. Sovrin provides a Web of Trust model for securing the Internet of Things that increases security and availability while giving device owners more control. Not bad stuff as far as it goes. Indeed, I think we have to.

article thumbnail

The Laws of Identity

Phil Windley

It's no coincidence that Internet Identity Workshop got started in 2005. Many people were talking about user-centric identity and developing ideas about how we might be able to create an identity layer for the Internet. The Internet was created without any way to identify the people who used it.

Banking 88
article thumbnail

Why would anyone buy FirstNet?

Chief Seattle Greek Blog

In the past, “local control” has meant local control of priority – having an incident commander able to designate which users or devices or applications have network priority. A police department will also want encryption, VPN, advanced authentication (FBI CJIS policy). IoPST – The Internet of Public Safety Things.

Network 28