SlideShare una empresa de Scribd logo
1 de 51
Internet of Memorable Things
Blockchain
Perspective
What is Blockchain and what types are there?
What is an Identity and how we manage it.
Identity Data - Storage, Protection, Visualization.
Ledgers and Identity Axioms
4
1
2
3
Program
The Future of Blockchains in IoT
5
• Internet of past to present
• IoT Infrastructure
• Security Keys (Public and Private)
• Smart City Applications
• International Systems
• Mobile and Fixed Radio Solutions
• Security Automation
• Machine to Machine
• Creating and Accessing Data
• Legacy Walled Gardens
• Proprietary Legacy Systems
• Big Data Analytics $$
• Authorities
• Law and Standards
• Data Sovereignty
• Universal Identity
• Privacy
It’s All About Communications
 IBM 2016
Centralized to Decentralized Network of Things
M2M and IOT integrates with all industries
• Safeguards for Privacy rights of devices and data
• Data Mass
• Duplication
• Cost
• Accessibility
• Integration
• Ownership
• Bandwidth
• Identity
• Location
More Integration – More Complexity
• Increased interest and investment form Governments and Business (DHS, NIST)
• User Centric World of ID Management driven by breaches of data (OPM, IRS, Target, others)
• IoT device integration with Public Safety LTE Networks
• Increase productivity by interoperability with M2M
• International Startups in the space (All countries)
• No single point failure or proven demise of the protocol
• Physical to digital asset prototypes gaining exposure (Ascribe/Art, Bitnation/Refugees,
Everledger/Diamonds)
• IBM and Microsoft, Linux diving in headstrong (IBM 40k lines of code)
Indicators of a Paradigm Shift to Blockchain
• A blockchain is a simple digital platform for recording and verifying transactions so that other people can’t
erase them later and anyone can see them. “You can think of the blockchain of an ‘append-only’ ledger.
You can only write to it, you can’t delete it,” Peter van Valkenburg
• At its heart, blockchain is a self-sustaining, peer-to-peer database technology for managing and
recording transactions with no central authority. Because blockchain verification is handled through
algorithms and consensus among multiple computers, the system is presumed immune to tampering,
fraud, or political control. It is designed to protect against domination of the network by any single
computer or group of computers.
• The blockchain is designed to make transactions safe and reliable even if the people doing them don’t
trust each other.
• At its core, a blockchain is a special type of data structure. The blocks within the chain contain data, but
this does not make it a database; at best the blocks represent the transaction log of a specific database
implementation.
• The distributed ledger technology that started with a cryptocurrency is rapidly becoming a crowd sourced
system for all types of verification for devices, software, notary publics, voting systems, and the way
banks manage transactions.
Blockchain
• Another simple way to look at Blockchains is that they
resemble the first memory chip in a computer.
• The processor would write to memory and then go
back to it to recover it’s state.
Pretty basic, but envision the processor and every other
part of a computer and put it into memory or ”blockchains”.
Every known thing can be recorded in a universal and
distributed blockchain memory ledger for future reference.
As volume and complexity of interacting things increases,
the locating and naming of these objects in memory is more
critical.
Blockchain is Memory
 IBM 2016
Number of Projected IoT Devices
Forcing Universal Identity Platform.
• Blockchain 1.0 Currency and Payments
• Blockchain 2.0 Smart Contracts, Programmable Assets, Decentralized Autonomous
Entities
• Blockchain 3.0 Non-Economic Applications (Art, health, education, public good, and
communications
• Etherium (Ether, Own Blockchain, Codius (blockchain agnostic platform), Oracles,
Smart Contracts )
• Ripple ( Financial Settlement, Permissioned Ledgers, distributed consensus)
• Blockstream (Sidechains, colored coins, Hybrid, supports Lightning )
• MIT Enigma (Developmental, coinless)
• Factom (Hashed digtal assets to blockchain)
• Auger
Off Chain or On Chain Transactions and storage of data
 Blockchain Bloat
 Permissioned (Trusted Parties) or Permissionless (Trustless..ie bitcoin)
Blockchain and Protocols
• Life
• Government
• Social
• Hardware
• Biometric
• Assets
• Social
• Education
• Multiple Identity Identifiers (Phone, Wearable, Location, Biometric, etc.)
Moving Data from the File Cabinet to Digital Lockers
Identity Management
• Blockchains can safeguards the privacy rights of individuals in relation to
the processing of personal data by:
 regulating computer application use
 giving individuals rights in relation to their personal information
 imposing responsibilities on organisations in terms of compliance with
the Data Protection rules and rights of access
• Data Protection Acts 1988 & 2003 create rights for individuals and
responsibilities for computer and other users.
• When you create a record which contains personal data not only should it
remain confidential but you are also obliged to keep it safe and secure and
use it only for the purpose for which it was collected.
• Safe Harbor – EU new laws effecting transport and storage of PII
• Privacy Laws being revisited by FTC, FCC, or let’s just say every
government business and agency!!!
• Insurance Liability
• Cost to secure or anonymise data
PII and Device Data
• Safeguards the privacy rights of devices in relation to the….
 RF Communications
 Location
 Registries, Registrars
• Data Mass
• Duplication
• Cost
• Access
• Integration
• Containers
• Storage
• Exploitation
• Right to be forgotten
IoT Data
Every tag or label can now be unique
• Labels
• Tags
• IPv4, Ipv6
• Profile
• Tracking
• NFC
• RFID
• Standards
• Interoperability
• Persistence
• Technology
• Unique GUID
• Global
• Securing Stock
We do all these things in silos today. Blockchains can connect all these “tags”
Identification
Definitions of Value are diverse and broad and not always fiat based.
Ledgers can track:
• Coupons
• Travel Miles
• Vouchers
• Liberty Bell Stamp
• Bitcoin, Altchains, Ether?
• Tokens
• Game Credits
• Virtual game merchandise
Attributes to consider:
 Dilution
 Authority
 Sustainability
 Interoperability
 Liquidity
 Trust
 Social Standard
 Mobile – Ease of use
 Financial standards and audibility
From Crypto Currencies to Storage of Value
• Facilities
• Smart Devices
• SaaS Products
• 3D to 5D Design
• Location, Space, and Time
• Design to Living Use Documents
• Living Buildings with Citizens, Government, and Owners
• Infrastructure Data Management
• Citizen Interoperability
• Cradle to Grave Device Management
• M2M Interoperability
• Protocol and Standards
• RF Frequencies and prioritization
• Proprietary and Open Source Systems
• Payment Gateways
• Inspections
• Open Data
Digital Demarcs – UID’s
• Silos and Walled Gardens
• Cloud(s)
• Governments
• Blockchains/Sidechains
• Municipal Data (Open Data Initiative)
• Ownership
• Provenance
• Common Attributes
• Over Time
• Containers and storage
To maximize the chance of data correctness it is absolutely necessary to provide independent governance,
supported by process and procedure, to manage data validation, entry, review and correction.
• User Updates (No central secure repository, Fragmented Data)
• Duplication of Bad Data
• Alteration of data by bad actors
• API’s (Outdated and costly to continuously update)
Data, Quality and Persistence
• Fintech (Securities, Settlements, FX Markets etc.)
• Linux Foundation (IBM, Microsoft, R3)
• NISC (Oath.., OpenID, )
• Kantera Initiative (Interledger, UMA)
• IBM (ADEPT)
• Microsoft Azure ( Etherium/Consensys, BlockApps Strato )
• Governments (Honduras, Japan, …All)
• Ascribe (Art, Assets, Copyrights)
Blockchain Developments
[ Image information in product ]
 Image : www.themegallery.com
 Note to customers : This image has been licensed to be used within this PowerPoint template only.
You may not extract the image for any other use.
Hyperledger
• Several studies have shown the organization that digital transactions within the next
four years will net $9.5 USD billion in capital, and global blockchain technology
investments will reach close to $300 billion
• DHS (Blockchain RFI)
• Banking R3 consortium (50m+, 50+ Financial Institutions)
• Blockstream 75m
Over one billion invested in Blockchain companies in 2015
Blockchain Investments
• US Smart City Applications
 Transit, Parking, Vehicles
 Vouchers, Welfare, Coupons,
 IoT Devices
 Services
 Utilities
 Healthcare
 Public Safety
 Open Data
 Use Tax
• B2B, B2G, C2G, C2B
• Estimates seeking to quantify the size of this untapped market are so far
scarce, though Wedbush Securities has forecasted micropayments could be a
$925bn market by 2025.
Micropayment – Tokens
• Real Estate
• Commodities
• Jewellery
• Titles, Deeds, Wills
• Airplanes and automobiles
• Stocks, Bonds, Securities
• Toll Roads
• Works of Art
• One of the more unique projects innovating in this area is Mediachain, a newly launched metadata protocol
that allows digital creators to attach information to their creative works, timestamp that data to the blockchain
and store it with the InterPlanetary File System (IPFS), a distributed file system incorporating aspects of
blockchain technology.
Digitization of Assets
Energy Sharing
Neo4j is a highly scalable, robust (fully ACID) native graph database. Neo4j is used in mission-critical apps by
thousands of leading startups, enterprises, and governments around the world.
The emergence of the Cloud, as the modern data
center, has given rise to newer and more powerful system
architectures that allow systems to leverage multiple compute
nodes operating in parallel. These architectures support the
ubiquitous nature of data in the Smart Grid.
• Graph Databases – Neo4j (AGPL License)
• Geo and Social Graph capable
• 12 Billion Nodes +
• Transparent Partitioning (Neo4j 2.0)
• Dataset Replication
Relationships - Graph Database
• Sidechains are blockchains that are interoperable with each other and with Bitcoin, avoiding liquidity
shortages, market fluctuations, fragmentation, security breaches and outright fraud associated with
alternative crypto-currencies.
• Bitcoin transactions are stored in a financial ledger, called the blockchain. It is secured by a powerful
distributed hashing network. A sidechain is a blockchain that validates data from other blockchains and
enables bitcoins and other assets to be transferred between blockchains fostering a new , open platform for
innovation a development.
• The use of a two-way peg enables Bitcoins and other assets to be tranferred between chains in a fixed or
otherwise deterministic exchange rate. A pegged sidechain is a sidechain whose assets can be imported
from and returned to other sidechains. Sidechains allow the blockchain to be enhanced with better
performance and privacy protections. They also enable new extensions to support myriad asset classes
like stocks, bonds, derivatives, and real/ or virtual world currencies as well as to add capabilities like smart
contracts, secure handles and real-world property registries.
Sidechains
• Smart contracts are protocols that facilitate, verify, or enforce the negotiation or
performance of a contract, or that make a contractual clause unnecessary.
• Smart contracts usually also have a user interface and often emulate the logic of
contractual clauses.
• Proponents of smart contracts believe that many kinds of contractual clauses may
thus be made partially or fully self-executing, self-enforcing, or both.
• Smart contracts aim to provide security superior to traditional contract law and to
reduce other transaction costs associated with contracting.
Every entity, authority, object, place , and time are needed to facilitate any smart contract.
These are outside inputs to the algorithm or process embedded in the living smart contract.
Smart Contracts
• An important aspect of smart cities is the so called Internet of Things (IoT). What they do
not mention is the downside of all these data gathering sensor based devices. By building
the transactions on a blockchain and adding smart contracts, the devices become
secure, private and anonymous by design. IBM defines this as “Device Democracy” in
which they state that devices and their owners and users should themselves control their
privacy and security.
• “Smart cities represent a great revenue opportunity for technology and services providers
(TSPs)”, and a little further: “While investment in IoT hardware is fundamental for smart
cities, the real revenue opportunity for TSPs is in the services and analytics sector”-
Gartner
• A lot of smart city projects are public-private-partnerships. The government (municipality)
should take responsibility for the long term wellbeing of citizens in terms of privacy,
transparency and security by adopting a framework and setting minimum requirements
for TSP’s.
Smart Cities
App Security
Server Side Apps
Zero Client Mobile Devices
Encryption End to End
Rapid Provisioning
Safe Data
 Securely Access your all computing Data & Software Apps Anywhere, Anytime, on Any Device
Thick, Thin, Mobile, Zero Clients
Chains
Block
Chains
Side
Chains
Bitcoin
Business
Etherium
Ripple
BYOB
Medical
Financial
EDU
Identity transpires across all industry chains
Interoperability
Blockchain
Permissionless
Private
Blockchain
Business
Blockchain
Supplier
Blockchain
Product
Blockchain
Asset
Ledger
Vendor
Ledger
Inventory
Ledger
Permissioned
Direct access to user centric data
One to many persistent data service
Identity Portals
Identity Management
Creation of Authenticated Unique Identities
Blockchain
A user centric identity management ecosystem designed to
bridge all architectures through identity using blockchain
technology.
Global Identity Ecosystem
Play Video Presentation
What would an identity solution require
to meet the future needs?
1. The ability to create unique, unduplicatable identities for every
entity, object, and device in the world. (infinitely scalable)
2. Maintain entity's ownership of identity and information.
3. A decentralized, distributed protected place to access, store, and
manage data.
4. A completely non-biased system agnostic platform.
Ultimatum
The world needs an universal identity platform that provides a unique
identity reference providing true persistent data over time and
ownership of information.
Data systems need to be efficient and reference a common identity
to meet the future demands of big data and the internet of things.
BridgeIdentity Offerings to Individuals:
• Attach any identity and information to their unique id
• Determine their information’s level of protection
• Update information only once (Persistent Data)
• Allow access to their information to other parties. (Smartphone ID)
• Sell their own information for use and revenue
• Establish ownership of devices with identity
• Opt In and Out through their identity
• Human-meaningful: Meaningfulness and memorability to the users.
• Decentralized: No need of a centralized authority for determining the meaning of a name.
• Secure: There is one, unique and specific entity to which the name applies.
Memorable Use - Zooko’s Triangle - Squared
https://en.wikipedia.org/wiki/Zooko%27s_triangle
+ Blockchains =
Example of memorable: Hotels.com, Cars.com, Business.com
MyHoteliD.com, MyVehicleID.com, MyBusinessID.com
Result: Unique and Memorable Identity Name Portals for each Identity
Sample Block Diagram
• Personnel data collection and program
administration.
• Biometric authentication and acceptance of valid
TWIC cardholders without time and cost of
additional background screening.
• Identity document verification, photo capture and
authorization-form management.
• Supervision of independent, third-party personal
identity verification and criminal history background
screening vendors.
• Production and delivery of membership ID Cards.
• Secure Web-based information management
system.
• Daily search of terrorist watch lists.
• Maximum privacy protection.
MyTWICID.com
MyPIVID.com
MyCACID.com
MyFRACID.com
MyBorderID.com
MyMilitaryID.com
MyGovernmentID.com
MyImagrantID.com
MyIrisID.com
MyEyeID.com
MySpeechID.com
MyBackgroundID.com
MyContractorID.com
MyVendorID.com
MyPrivacyID.com
MyMembershipID.com
MyInternationalID.com
MyNationalID.com
MyPassportID.com
MyBiometricID.com
Authentication
• Maintaining current training records and
certifications.
• Alerting department members and/or training
officers of expiring certifications.
• Optimally deploying responders to critical
incident scenes based on verifiable skillsets.
• Authenticating mutual-aid responders to verify
qualifications prior to allowing access to
hazardous environments.
• Ensuring only authorized personnel enter an
incident scene.
• Providing a secure, managed service that is
accessible from anywhere.
MyPoliceID.com
MyFiremanID.com
MyResponderID.com
MyHealthcareIID.com
MyVolunteerID.com
MyCiteID.com
MyCitizenID.com
MyCivilID.com
MyMilitaryID.com
MyGovernmentID.com
MyFederalID.com
MyRadioID.com
MyGPSID.com
MyDeviceID.com
MyPropertyID.com
MyBadgeID.com
MyCameraID.com
MyWi-FiID.com
Public Safety
University ID/Raider Card
Education
Your
Mes
sage
Here
16:59
MyCampusID.com
MySchoolID.com
MyTeacherID.com
MyUniversityID.com
MyStudentID.com
MyParentID.com
MyVehicaID.com
MyParkingID.com
MyGymID.com
MyLoginID.com
MyBikeID.com
MyEmergencyID.com
MyTranscriptID.com
MyUniversityID.com
MyBookID.com
MyE-BookID.com
MyWearableID.com
Access
Control
Cloud Card Production
Login -BYOD
Mobile Digital ID’s
Integrated Apps
Local Discounts
Books
Transcripts
Healthcare
MyHealthcareID.com
MyMedicalID.com
MyPatientID.com
MyDonorID.com
MyDoctorID.com
MyMedicareID.com
MyMedicaidID.com
MyEmergencyID.com
MyDentalID.com
MyGeneticID.com
MyInfantID.com
MyBirthID.com
MyEDeviceID.com
MyPictureID.com
MyMonitorID.com
MyInsuranceID.com
MyPharmacyID.com
MyChildID.com
MyDaycareID.com
MyChildcareID.com
MyPhysicianID.com
Healthcare information protection
and online access laws are a driving
force behind BridgeIDentity. Direct
access to medical records, hospitals,
doctors, pharmacies, and
government services are in the very
near future for all individuals,
companies, and healthcare providers.
This precedence will set a guiding
path of technology used to access
confidential information through
secure interactive portals.
Smart Grid – Customer - Commercial
MyMeterID.com
MySmartGridID.com
MyGridID.com
MySmartcarID.com
MySmarthomeID.com
MyTagID.com
MySensorID.com
MySmartMeterID.com
MyEquipmentID.com
MyLocationiD.com
MyEDeviceID.com
MyM2MID.com
MyCameraID.com
MyMonitorID.com
MyRadioID.com
MySubscriberID.com
MyRouterID.com
MyIPv4ID.com
MyIPv6ID.com
Identity Cluster Example
Identity Cluster Example
Frameworks E1
Frameworks E2
Identity Framework Example
Sample Data Funnel Example
Authenticated Data Providers can funnel data into blockchains creating recurring revenue.
Users can get paid for research use of their data as well though micropayments.
• Promote quality of services through blockchain interoperability
and not merely a duplication of fragmented legacy systems and
services.
• Promote user centric applications with ease of use.
• Develop an ecosystem of collaboration between all entities.
• Work with incubators, startups, and business development in this
space
• Partner with visionaries that grasp the depth of this new
technology and harness it’s power.
• Utilize this technology to save energy and lives.
Where are we going from here?
T h a n k Y o u !
L e t U s C r o s s T o g e t h e r

Más contenido relacionado

La actualidad más candente

MultiChain – Private multicurrency blockchain platform
MultiChain – Private multicurrency blockchain platformMultiChain – Private multicurrency blockchain platform
MultiChain – Private multicurrency blockchain platformCoin Sciences Ltd
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?ThreadSol
 
A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.Dev
 
What is Ethereum 2.0
What is Ethereum 2.0 What is Ethereum 2.0
What is Ethereum 2.0 Vikram Khanna
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Qais Ammari
 
HealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainHealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainMd. Mahfujur Rahman
 
Cato Management Console
Cato Management ConsoleCato Management Console
Cato Management ConsoleCatoNetworks
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in HealthcareSusan Dart
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyhellygeorge
 
Creating Smart Contract
Creating Smart ContractCreating Smart Contract
Creating Smart ContractDeepak Aryal
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2Justin Richer
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Priyanka Aash
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsJon Todd
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use CasesCapgemini
 

La actualidad más candente (20)

MultiChain – Private multicurrency blockchain platform
MultiChain – Private multicurrency blockchain platformMultiChain – Private multicurrency blockchain platform
MultiChain – Private multicurrency blockchain platform
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
What is Block-Chain Technology?
What is Block-Chain Technology?What is Block-Chain Technology?
What is Block-Chain Technology?
 
A technical Introduction to Blockchain.
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Fortimanager admin-40-mr3
Fortimanager admin-40-mr3Fortimanager admin-40-mr3
Fortimanager admin-40-mr3
 
What is Ethereum 2.0
What is Ethereum 2.0 What is Ethereum 2.0
What is Ethereum 2.0
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)
 
HealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using BlockchainHealthBlock: A Secured Healthcare Data using Blockchain
HealthBlock: A Secured Healthcare Data using Blockchain
 
Cato Management Console
Cato Management ConsoleCato Management Console
Cato Management Console
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
vPC_Final
vPC_FinalvPC_Final
vPC_Final
 
AMQP
AMQPAMQP
AMQP
 
Creating Smart Contract
Creating Smart ContractCreating Smart Contract
Creating Smart Contract
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTs
 
Blockchain: Real World Use Cases
Blockchain: Real World Use CasesBlockchain: Real World Use Cases
Blockchain: Real World Use Cases
 

Destacado

Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTRobin Teigland
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 BlockchainHub Graz
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesSébastien Tandel
 
Watson iot blockchain api concept 20160728
Watson iot blockchain api concept 20160728Watson iot blockchain api concept 20160728
Watson iot blockchain api concept 20160728Tsuyoshi Hirayama
 
Blockchain Health and Crypto Wellness Futures
Blockchain Health and Crypto Wellness FuturesBlockchain Health and Crypto Wellness Futures
Blockchain Health and Crypto Wellness FuturesMelanie Swan
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus ProtocolsMelanie Swan
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016CoinDesk
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
 
IOTA Introduction for Hack the Valley attendees
IOTA Introduction for Hack the Valley attendeesIOTA Introduction for Hack the Valley attendees
IOTA Introduction for Hack the Valley attendeesVasiliy Suvorov
 
CoinSpace İş Sunumu
CoinSpace İş SunumuCoinSpace İş Sunumu
CoinSpace İş SunumuErdem Tuncer
 
The value of blockchain application
The value of blockchain applicationThe value of blockchain application
The value of blockchain application学劢 俞
 
Systems and Technical Architecture
Systems and Technical ArchitectureSystems and Technical Architecture
Systems and Technical ArchitectureRachel Gladdis
 
Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...
Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...
Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...Cognizant
 
Blockchain - CIO City Workshop
Blockchain - CIO City WorkshopBlockchain - CIO City Workshop
Blockchain - CIO City WorkshopCegeka
 
Smart contracts in Solidity
Smart contracts in SoliditySmart contracts in Solidity
Smart contracts in SolidityFelix Crisan
 
How Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the InternetHow Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the InternetGilles Fedak
 
Blockchain Cloudminds: Human-Machine Pooled-Mind DACs
Blockchain Cloudminds: Human-Machine Pooled-Mind DACsBlockchain Cloudminds: Human-Machine Pooled-Mind DACs
Blockchain Cloudminds: Human-Machine Pooled-Mind DACsMelanie Swan
 
Blockchain Technology - Application and Benefits [17 May 2016]
Blockchain Technology - Application and Benefits [17 May 2016]Blockchain Technology - Application and Benefits [17 May 2016]
Blockchain Technology - Application and Benefits [17 May 2016]Mick Motion-Wise
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapRichard Warren
 

Destacado (20)

Bitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoTBitcoin, Blockchain, and IoT
Bitcoin, Blockchain, and IoT
 
IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5 IOTA Presentation - BlockchainHub Graz Meetup #5
IOTA Presentation - BlockchainHub Graz Meetup #5
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Watson iot blockchain api concept 20160728
Watson iot blockchain api concept 20160728Watson iot blockchain api concept 20160728
Watson iot blockchain api concept 20160728
 
Blockchain Health and Crypto Wellness Futures
Blockchain Health and Crypto Wellness FuturesBlockchain Health and Crypto Wellness Futures
Blockchain Health and Crypto Wellness Futures
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus Protocols
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
Python Bindings Overview
Python Bindings OverviewPython Bindings Overview
Python Bindings Overview
 
IOTA Introduction for Hack the Valley attendees
IOTA Introduction for Hack the Valley attendeesIOTA Introduction for Hack the Valley attendees
IOTA Introduction for Hack the Valley attendees
 
CoinSpace İş Sunumu
CoinSpace İş SunumuCoinSpace İş Sunumu
CoinSpace İş Sunumu
 
The value of blockchain application
The value of blockchain applicationThe value of blockchain application
The value of blockchain application
 
Systems and Technical Architecture
Systems and Technical ArchitectureSystems and Technical Architecture
Systems and Technical Architecture
 
Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...
Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...
Blockchain's Smart Contracts: Driving the Next Wave of Innovation Across Manu...
 
Blockchain - CIO City Workshop
Blockchain - CIO City WorkshopBlockchain - CIO City Workshop
Blockchain - CIO City Workshop
 
Smart contracts in Solidity
Smart contracts in SoliditySmart contracts in Solidity
Smart contracts in Solidity
 
How Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the InternetHow Blockchain and Smart Buildings can Reshape the Internet
How Blockchain and Smart Buildings can Reshape the Internet
 
Blockchain Cloudminds: Human-Machine Pooled-Mind DACs
Blockchain Cloudminds: Human-Machine Pooled-Mind DACsBlockchain Cloudminds: Human-Machine Pooled-Mind DACs
Blockchain Cloudminds: Human-Machine Pooled-Mind DACs
 
Blockchain Technology - Application and Benefits [17 May 2016]
Blockchain Technology - Application and Benefits [17 May 2016]Blockchain Technology - Application and Benefits [17 May 2016]
Blockchain Technology - Application and Benefits [17 May 2016]
 
FirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market MapFirstPartner 2016 Blockchain Ecosystem Market Map
FirstPartner 2016 Blockchain Ecosystem Market Map
 

Similar a Blockchain Perspective - Internet of Memorable Things

Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalDavid Lee Kuo Chuen 李国权
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJAsh Yadav
 
Shift Money 2019 - The future of DLT and its applications in the financial se...
Shift Money 2019 - The future of DLT and its applications in the financial se...Shift Money 2019 - The future of DLT and its applications in the financial se...
Shift Money 2019 - The future of DLT and its applications in the financial se...Shift Conference
 
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use CasesSITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use Casessitist
 
Team2Jax_FinalPresentation
Team2Jax_FinalPresentationTeam2Jax_FinalPresentation
Team2Jax_FinalPresentationAnh Thuc Tran
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Dr. Kotrappa Sirbi
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​EC-Council
 
Blockchain & crypto
Blockchain & cryptoBlockchain & crypto
Blockchain & cryptoAtul Mangat
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessDavid Joao Vieira Carvalho
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 

Similar a Blockchain Perspective - Internet of Memorable Things (20)

Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
Blockchain
Blockchain Blockchain
Blockchain
 
Blockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_FinalBlockchain As An Enabler_16 July 2016_David Lee_Final
Blockchain As An Enabler_16 July 2016_David Lee_Final
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJ
 
Shift Money 2019 - The future of DLT and its applications in the financial se...
Shift Money 2019 - The future of DLT and its applications in the financial se...Shift Money 2019 - The future of DLT and its applications in the financial se...
Shift Money 2019 - The future of DLT and its applications in the financial se...
 
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use CasesSITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
SITIST 2018 Part 1 - Blockchain and Enterprise Use Cases
 
Team2Jax_FinalPresentation
Team2Jax_FinalPresentationTeam2Jax_FinalPresentation
Team2Jax_FinalPresentation
 
Leveraging IOT and Latest Technologies
Leveraging IOT and Latest TechnologiesLeveraging IOT and Latest Technologies
Leveraging IOT and Latest Technologies
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...Blockchain Technology and Its Application in Artificial Intelligence and Mach...
Blockchain Technology and Its Application in Artificial Intelligence and Mach...
 
Blockchain@next18 event
Blockchain@next18 eventBlockchain@next18 event
Blockchain@next18 event
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​Blockchain: Fundamentals & Opportunities​
Blockchain: Fundamentals & Opportunities​
 
Blockchain & crypto
Blockchain & cryptoBlockchain & crypto
Blockchain & crypto
 
BaaS for IoT
BaaS for IoTBaaS for IoT
BaaS for IoT
 
Blockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your businessBlockchain as a new cyber strategy for your business
Blockchain as a new cyber strategy for your business
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

Blockchain Perspective - Internet of Memorable Things

  • 1. Internet of Memorable Things Blockchain Perspective
  • 2. What is Blockchain and what types are there? What is an Identity and how we manage it. Identity Data - Storage, Protection, Visualization. Ledgers and Identity Axioms 4 1 2 3 Program The Future of Blockchains in IoT 5
  • 3. • Internet of past to present • IoT Infrastructure • Security Keys (Public and Private) • Smart City Applications • International Systems • Mobile and Fixed Radio Solutions • Security Automation • Machine to Machine • Creating and Accessing Data • Legacy Walled Gardens • Proprietary Legacy Systems • Big Data Analytics $$ • Authorities • Law and Standards • Data Sovereignty • Universal Identity • Privacy It’s All About Communications
  • 4.  IBM 2016 Centralized to Decentralized Network of Things
  • 5. M2M and IOT integrates with all industries • Safeguards for Privacy rights of devices and data • Data Mass • Duplication • Cost • Accessibility • Integration • Ownership • Bandwidth • Identity • Location More Integration – More Complexity
  • 6. • Increased interest and investment form Governments and Business (DHS, NIST) • User Centric World of ID Management driven by breaches of data (OPM, IRS, Target, others) • IoT device integration with Public Safety LTE Networks • Increase productivity by interoperability with M2M • International Startups in the space (All countries) • No single point failure or proven demise of the protocol • Physical to digital asset prototypes gaining exposure (Ascribe/Art, Bitnation/Refugees, Everledger/Diamonds) • IBM and Microsoft, Linux diving in headstrong (IBM 40k lines of code) Indicators of a Paradigm Shift to Blockchain
  • 7. • A blockchain is a simple digital platform for recording and verifying transactions so that other people can’t erase them later and anyone can see them. “You can think of the blockchain of an ‘append-only’ ledger. You can only write to it, you can’t delete it,” Peter van Valkenburg • At its heart, blockchain is a self-sustaining, peer-to-peer database technology for managing and recording transactions with no central authority. Because blockchain verification is handled through algorithms and consensus among multiple computers, the system is presumed immune to tampering, fraud, or political control. It is designed to protect against domination of the network by any single computer or group of computers. • The blockchain is designed to make transactions safe and reliable even if the people doing them don’t trust each other. • At its core, a blockchain is a special type of data structure. The blocks within the chain contain data, but this does not make it a database; at best the blocks represent the transaction log of a specific database implementation. • The distributed ledger technology that started with a cryptocurrency is rapidly becoming a crowd sourced system for all types of verification for devices, software, notary publics, voting systems, and the way banks manage transactions. Blockchain
  • 8. • Another simple way to look at Blockchains is that they resemble the first memory chip in a computer. • The processor would write to memory and then go back to it to recover it’s state. Pretty basic, but envision the processor and every other part of a computer and put it into memory or ”blockchains”. Every known thing can be recorded in a universal and distributed blockchain memory ledger for future reference. As volume and complexity of interacting things increases, the locating and naming of these objects in memory is more critical. Blockchain is Memory
  • 9.  IBM 2016 Number of Projected IoT Devices Forcing Universal Identity Platform.
  • 10. • Blockchain 1.0 Currency and Payments • Blockchain 2.0 Smart Contracts, Programmable Assets, Decentralized Autonomous Entities • Blockchain 3.0 Non-Economic Applications (Art, health, education, public good, and communications • Etherium (Ether, Own Blockchain, Codius (blockchain agnostic platform), Oracles, Smart Contracts ) • Ripple ( Financial Settlement, Permissioned Ledgers, distributed consensus) • Blockstream (Sidechains, colored coins, Hybrid, supports Lightning ) • MIT Enigma (Developmental, coinless) • Factom (Hashed digtal assets to blockchain) • Auger Off Chain or On Chain Transactions and storage of data  Blockchain Bloat  Permissioned (Trusted Parties) or Permissionless (Trustless..ie bitcoin) Blockchain and Protocols
  • 11. • Life • Government • Social • Hardware • Biometric • Assets • Social • Education • Multiple Identity Identifiers (Phone, Wearable, Location, Biometric, etc.) Moving Data from the File Cabinet to Digital Lockers Identity Management
  • 12. • Blockchains can safeguards the privacy rights of individuals in relation to the processing of personal data by:  regulating computer application use  giving individuals rights in relation to their personal information  imposing responsibilities on organisations in terms of compliance with the Data Protection rules and rights of access • Data Protection Acts 1988 & 2003 create rights for individuals and responsibilities for computer and other users. • When you create a record which contains personal data not only should it remain confidential but you are also obliged to keep it safe and secure and use it only for the purpose for which it was collected. • Safe Harbor – EU new laws effecting transport and storage of PII • Privacy Laws being revisited by FTC, FCC, or let’s just say every government business and agency!!! • Insurance Liability • Cost to secure or anonymise data PII and Device Data
  • 13. • Safeguards the privacy rights of devices in relation to the….  RF Communications  Location  Registries, Registrars • Data Mass • Duplication • Cost • Access • Integration • Containers • Storage • Exploitation • Right to be forgotten IoT Data
  • 14. Every tag or label can now be unique • Labels • Tags • IPv4, Ipv6 • Profile • Tracking • NFC • RFID • Standards • Interoperability • Persistence • Technology • Unique GUID • Global • Securing Stock We do all these things in silos today. Blockchains can connect all these “tags” Identification
  • 15. Definitions of Value are diverse and broad and not always fiat based. Ledgers can track: • Coupons • Travel Miles • Vouchers • Liberty Bell Stamp • Bitcoin, Altchains, Ether? • Tokens • Game Credits • Virtual game merchandise Attributes to consider:  Dilution  Authority  Sustainability  Interoperability  Liquidity  Trust  Social Standard  Mobile – Ease of use  Financial standards and audibility From Crypto Currencies to Storage of Value
  • 16. • Facilities • Smart Devices • SaaS Products • 3D to 5D Design • Location, Space, and Time • Design to Living Use Documents • Living Buildings with Citizens, Government, and Owners • Infrastructure Data Management • Citizen Interoperability • Cradle to Grave Device Management • M2M Interoperability • Protocol and Standards • RF Frequencies and prioritization • Proprietary and Open Source Systems • Payment Gateways • Inspections • Open Data Digital Demarcs – UID’s
  • 17. • Silos and Walled Gardens • Cloud(s) • Governments • Blockchains/Sidechains • Municipal Data (Open Data Initiative) • Ownership • Provenance • Common Attributes • Over Time • Containers and storage To maximize the chance of data correctness it is absolutely necessary to provide independent governance, supported by process and procedure, to manage data validation, entry, review and correction. • User Updates (No central secure repository, Fragmented Data) • Duplication of Bad Data • Alteration of data by bad actors • API’s (Outdated and costly to continuously update) Data, Quality and Persistence
  • 18. • Fintech (Securities, Settlements, FX Markets etc.) • Linux Foundation (IBM, Microsoft, R3) • NISC (Oath.., OpenID, ) • Kantera Initiative (Interledger, UMA) • IBM (ADEPT) • Microsoft Azure ( Etherium/Consensys, BlockApps Strato ) • Governments (Honduras, Japan, …All) • Ascribe (Art, Assets, Copyrights) Blockchain Developments
  • 19. [ Image information in product ]  Image : www.themegallery.com  Note to customers : This image has been licensed to be used within this PowerPoint template only. You may not extract the image for any other use. Hyperledger
  • 20. • Several studies have shown the organization that digital transactions within the next four years will net $9.5 USD billion in capital, and global blockchain technology investments will reach close to $300 billion • DHS (Blockchain RFI) • Banking R3 consortium (50m+, 50+ Financial Institutions) • Blockstream 75m Over one billion invested in Blockchain companies in 2015 Blockchain Investments
  • 21. • US Smart City Applications  Transit, Parking, Vehicles  Vouchers, Welfare, Coupons,  IoT Devices  Services  Utilities  Healthcare  Public Safety  Open Data  Use Tax • B2B, B2G, C2G, C2B • Estimates seeking to quantify the size of this untapped market are so far scarce, though Wedbush Securities has forecasted micropayments could be a $925bn market by 2025. Micropayment – Tokens
  • 22. • Real Estate • Commodities • Jewellery • Titles, Deeds, Wills • Airplanes and automobiles • Stocks, Bonds, Securities • Toll Roads • Works of Art • One of the more unique projects innovating in this area is Mediachain, a newly launched metadata protocol that allows digital creators to attach information to their creative works, timestamp that data to the blockchain and store it with the InterPlanetary File System (IPFS), a distributed file system incorporating aspects of blockchain technology. Digitization of Assets
  • 24. Neo4j is a highly scalable, robust (fully ACID) native graph database. Neo4j is used in mission-critical apps by thousands of leading startups, enterprises, and governments around the world. The emergence of the Cloud, as the modern data center, has given rise to newer and more powerful system architectures that allow systems to leverage multiple compute nodes operating in parallel. These architectures support the ubiquitous nature of data in the Smart Grid. • Graph Databases – Neo4j (AGPL License) • Geo and Social Graph capable • 12 Billion Nodes + • Transparent Partitioning (Neo4j 2.0) • Dataset Replication Relationships - Graph Database
  • 25. • Sidechains are blockchains that are interoperable with each other and with Bitcoin, avoiding liquidity shortages, market fluctuations, fragmentation, security breaches and outright fraud associated with alternative crypto-currencies. • Bitcoin transactions are stored in a financial ledger, called the blockchain. It is secured by a powerful distributed hashing network. A sidechain is a blockchain that validates data from other blockchains and enables bitcoins and other assets to be transferred between blockchains fostering a new , open platform for innovation a development. • The use of a two-way peg enables Bitcoins and other assets to be tranferred between chains in a fixed or otherwise deterministic exchange rate. A pegged sidechain is a sidechain whose assets can be imported from and returned to other sidechains. Sidechains allow the blockchain to be enhanced with better performance and privacy protections. They also enable new extensions to support myriad asset classes like stocks, bonds, derivatives, and real/ or virtual world currencies as well as to add capabilities like smart contracts, secure handles and real-world property registries. Sidechains
  • 26. • Smart contracts are protocols that facilitate, verify, or enforce the negotiation or performance of a contract, or that make a contractual clause unnecessary. • Smart contracts usually also have a user interface and often emulate the logic of contractual clauses. • Proponents of smart contracts believe that many kinds of contractual clauses may thus be made partially or fully self-executing, self-enforcing, or both. • Smart contracts aim to provide security superior to traditional contract law and to reduce other transaction costs associated with contracting. Every entity, authority, object, place , and time are needed to facilitate any smart contract. These are outside inputs to the algorithm or process embedded in the living smart contract. Smart Contracts
  • 27. • An important aspect of smart cities is the so called Internet of Things (IoT). What they do not mention is the downside of all these data gathering sensor based devices. By building the transactions on a blockchain and adding smart contracts, the devices become secure, private and anonymous by design. IBM defines this as “Device Democracy” in which they state that devices and their owners and users should themselves control their privacy and security. • “Smart cities represent a great revenue opportunity for technology and services providers (TSPs)”, and a little further: “While investment in IoT hardware is fundamental for smart cities, the real revenue opportunity for TSPs is in the services and analytics sector”- Gartner • A lot of smart city projects are public-private-partnerships. The government (municipality) should take responsibility for the long term wellbeing of citizens in terms of privacy, transparency and security by adopting a framework and setting minimum requirements for TSP’s. Smart Cities
  • 28. App Security Server Side Apps Zero Client Mobile Devices Encryption End to End Rapid Provisioning Safe Data  Securely Access your all computing Data & Software Apps Anywhere, Anytime, on Any Device Thick, Thin, Mobile, Zero Clients
  • 31. Direct access to user centric data One to many persistent data service Identity Portals Identity Management Creation of Authenticated Unique Identities Blockchain A user centric identity management ecosystem designed to bridge all architectures through identity using blockchain technology.
  • 32. Global Identity Ecosystem Play Video Presentation
  • 33. What would an identity solution require to meet the future needs? 1. The ability to create unique, unduplicatable identities for every entity, object, and device in the world. (infinitely scalable) 2. Maintain entity's ownership of identity and information. 3. A decentralized, distributed protected place to access, store, and manage data. 4. A completely non-biased system agnostic platform. Ultimatum The world needs an universal identity platform that provides a unique identity reference providing true persistent data over time and ownership of information. Data systems need to be efficient and reference a common identity to meet the future demands of big data and the internet of things.
  • 34. BridgeIdentity Offerings to Individuals: • Attach any identity and information to their unique id • Determine their information’s level of protection • Update information only once (Persistent Data) • Allow access to their information to other parties. (Smartphone ID) • Sell their own information for use and revenue • Establish ownership of devices with identity • Opt In and Out through their identity
  • 35. • Human-meaningful: Meaningfulness and memorability to the users. • Decentralized: No need of a centralized authority for determining the meaning of a name. • Secure: There is one, unique and specific entity to which the name applies. Memorable Use - Zooko’s Triangle - Squared https://en.wikipedia.org/wiki/Zooko%27s_triangle + Blockchains = Example of memorable: Hotels.com, Cars.com, Business.com MyHoteliD.com, MyVehicleID.com, MyBusinessID.com Result: Unique and Memorable Identity Name Portals for each Identity
  • 36.
  • 38.
  • 39. • Personnel data collection and program administration. • Biometric authentication and acceptance of valid TWIC cardholders without time and cost of additional background screening. • Identity document verification, photo capture and authorization-form management. • Supervision of independent, third-party personal identity verification and criminal history background screening vendors. • Production and delivery of membership ID Cards. • Secure Web-based information management system. • Daily search of terrorist watch lists. • Maximum privacy protection. MyTWICID.com MyPIVID.com MyCACID.com MyFRACID.com MyBorderID.com MyMilitaryID.com MyGovernmentID.com MyImagrantID.com MyIrisID.com MyEyeID.com MySpeechID.com MyBackgroundID.com MyContractorID.com MyVendorID.com MyPrivacyID.com MyMembershipID.com MyInternationalID.com MyNationalID.com MyPassportID.com MyBiometricID.com Authentication
  • 40. • Maintaining current training records and certifications. • Alerting department members and/or training officers of expiring certifications. • Optimally deploying responders to critical incident scenes based on verifiable skillsets. • Authenticating mutual-aid responders to verify qualifications prior to allowing access to hazardous environments. • Ensuring only authorized personnel enter an incident scene. • Providing a secure, managed service that is accessible from anywhere. MyPoliceID.com MyFiremanID.com MyResponderID.com MyHealthcareIID.com MyVolunteerID.com MyCiteID.com MyCitizenID.com MyCivilID.com MyMilitaryID.com MyGovernmentID.com MyFederalID.com MyRadioID.com MyGPSID.com MyDeviceID.com MyPropertyID.com MyBadgeID.com MyCameraID.com MyWi-FiID.com Public Safety
  • 42. Healthcare MyHealthcareID.com MyMedicalID.com MyPatientID.com MyDonorID.com MyDoctorID.com MyMedicareID.com MyMedicaidID.com MyEmergencyID.com MyDentalID.com MyGeneticID.com MyInfantID.com MyBirthID.com MyEDeviceID.com MyPictureID.com MyMonitorID.com MyInsuranceID.com MyPharmacyID.com MyChildID.com MyDaycareID.com MyChildcareID.com MyPhysicianID.com Healthcare information protection and online access laws are a driving force behind BridgeIDentity. Direct access to medical records, hospitals, doctors, pharmacies, and government services are in the very near future for all individuals, companies, and healthcare providers. This precedence will set a guiding path of technology used to access confidential information through secure interactive portals.
  • 43. Smart Grid – Customer - Commercial MyMeterID.com MySmartGridID.com MyGridID.com MySmartcarID.com MySmarthomeID.com MyTagID.com MySensorID.com MySmartMeterID.com MyEquipmentID.com MyLocationiD.com MyEDeviceID.com MyM2MID.com MyCameraID.com MyMonitorID.com MyRadioID.com MySubscriberID.com MyRouterID.com MyIPv4ID.com MyIPv6ID.com
  • 49. Sample Data Funnel Example Authenticated Data Providers can funnel data into blockchains creating recurring revenue. Users can get paid for research use of their data as well though micropayments.
  • 50. • Promote quality of services through blockchain interoperability and not merely a duplication of fragmented legacy systems and services. • Promote user centric applications with ease of use. • Develop an ecosystem of collaboration between all entities. • Work with incubators, startups, and business development in this space • Partner with visionaries that grasp the depth of this new technology and harness it’s power. • Utilize this technology to save energy and lives. Where are we going from here?
  • 51. T h a n k Y o u ! L e t U s C r o s s T o g e t h e r