Remove Authentication Remove Banking Remove Examples Remove Network
article thumbnail

Making Banking a More Effortless Experience

CIO Business Intelligence

Along with nearly every other industry, banking is facing greater competitive pressure than ever. As banks continue to face this reality, they’re also tasked with addressing a variety of rapidly changing issues, including those surrounding data protection, adoption of cryptocurrency, and anonymizing data (AI models). .

Banking 108
article thumbnail

Privacy, Authenticity, and Confidentiality

Phil Windley

Summary: Authenticity and privacy are usually traded off against each other. At a recent Utah SSI Meetup , Sam Smith discussed the tradeoff between privacy, authenticity and confidentiality. Authenticity allows parties to a conversation to know to whom they are talking. The following diagram illustrates these tradeoffs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Acceptance Networks for Self-Sovereign Identity

Phil Windley

When I hand a merchant in London a piece of plastic that I got from a bank in Utah to make a purchase, a tiny miracle happens. In the past, these kinds of transactions required that the merchant trust me or my bank. Visa, Mastercard, American Express, and Discover are all examples of acceptance networks.

Network 89
article thumbnail

Authentic Digital Relationships

Phil Windley

Our online relationships with ecommerce companies, social media providers, banks, and others are cold and impersonal, but also relatively efficient. For example, social media platforms are designed to allow people to form a link (symmetrical or asymmetrical) to others online. As an example, consider an automobile.

article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. Perhaps the most familiar example of a metasystem is the internet. I've spoken about the Sovrin Network as an identity metasystem before.

System 87
article thumbnail

CIOs Look For Ways To Fool Hackers

The Accidental Successful CIO

Image Credit: Brian Klug Every CIO realizes that a key part of their job is to find ways to keep the bad guys out of the company’s networks. However, I think that we all have to agree that despite our best efforts there is always the possibility that the bad guys may find a way to get into our networks.

Firewall 130
article thumbnail

Trojan source code leak poised to spur new online banking attacks

Network World

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users. The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500.

Banking 60