Book of Proceedings
Total Page:16
File Type:pdf, Size:1020Kb
OCTOBER 25, 26 & 27 2016 Book of Proceedings www.internetidentityworkshop.com Collected & Compiled by MILLICENT BOGERT, HEIDI N SAUL AND JACOB WINDLEY Notes in this book can also be found online at http://iiw.idcommons.net/IIW_23_Notes Photo credit #IIW @Nobantu Next IIW is May 2,3 & 4 2017 Computer History Museum ~ Mountain View, CA IIW founded by Kaliya Young, Phil Windley and Doc Searls Co-produced by Kaliya Young, Phil Windley and Heidi Nobantu Saul Facilitated by Heidi Nobantu Saul and Kaliya Young Contents About IIW ..................................................................................................... 3 Identity Films @ IIW ......................................................................................... 4 IIW 23 Session Topics / Agenda Creation ................................................................ 5 Tuesday October 25 ......................................................................................... 8 PDEC Update .............................................................................................. 8 “Correlation” TAFKA “Identity” ........................................................................ 9 Intro to Verifiable Claims .............................................................................. 10 End-to-End Decentralized Identity Platform ........................................................ 11 The Blue Button Experience ........................................................................... 11 Intro to Oauth2 .......................................................................................... 12 The 4 Kinds of Privacy .................................................................................. 14 ONTY ...................................................................................................... 14 UX Hacking the Personal Data Dashboard ............................................................ 16 Account Chooser, the Re-Charter ..................................................................... 18 Data Portability .......................................................................................... 19 Personal Data Stores in the Enterprise ............................................................... 22 Intro to Open ID Connect ............................................................................... 22 Remote Identity Proofing .............................................................................. 24 Kantara Incubator R&D Funds ......................................................................... 25 JLINC ...................................................................................................... 25 Personal APIs ............................................................................................. 28 Financial Data Aggregation & Sovereign Identity ................................................... 29 First Party Terms ........................................................................................ 30 Military Identity Use Cases ............................................................................. 32 Defining the Sphere of Privacy ........................................................................ 33 Smart Contracts for Self-Sovereign Data ............................................................. 34 Fast Fed and How to “Identity Enable” a Cloud Business Service ................................ 34 Self-Sovereign Identity Container Deep Dive ........................................................ 35 Help Me “Help” My Professor .......................................................................... 35 What is Sovrin ............................................................................................ 36 Intro: User-Managed Access ............................................................................ 39 Signed and Revocable Biometrics ..................................................................... 39 Security Event Token 101 .............................................................................. 40 Self-Sovereign Support Technology ................................................................... 42 Principles of Self-Sovereign Identity.................................................................. 43 Self-Sovereign Digital Identity for Kids ............................................................... 45 Standards for Internet of Things ...................................................................... 46 Wednesday October 26 .................................................................................... 48 SMS for 2-Factor Authentication ...................................................................... 48 Tutorial PBFT ............................................................................................ 50 Decentralized Identifiers Spec ........................................................................ 51 Wells Fargo: Never Again ............................................................................... 54 Ways to Use the Films .................................................................................. 56 Unconferences in More Fields ......................................................................... 57 MFA 3.0 ................................................................................................... 58 Identity Professionals Association ..................................................................... 59 Identity Verification Flows and Machine Learning in Fintech ..................................... 60 Security Event Distribution ............................................................................ 61 IIW 23 Page 1 Virtual Universities and Student Profiles ............................................................ 62 Verifiable Claims Deep Dive ........................................................................... 62 Blockchain Family Values .............................................................................. 63 My Data Technology Stack 101 ........................................................................ 64 Building a Secure Consumer Fintech ................................................................. 65 Fast Fed Part 2........................................................................................... 65 Consent Receipts ........................................................................................ 66 Self-Sovereign Identity: What’s Different ........................................................... 67 Picolabs ................................................................................................... 69 OTTO: Open Trust Taxonomy for Federation Operators ........................................... 70 Ecosystem Maps.......................................................................................... 71 Reputation Algorithms & Scoring for Curating Self-Sovereign Data .............................. 74 Personal API Implementation .......................................................................... 75 XDI Update ............................................................................................... 75 Access Control & Data Rights for the Industrial Internet .......................................... 76 Identity in Physics ....................................................................................... 77 OIDC Identity Federations .............................................................................. 82 Identity Without the Individual........................................................................ 82 Thursday October 27 ....................................................................................... 83 Design of a Scalable Service Broker .................................................................. 83 Federated/Decentralized Social Web ................................................................ 84 Container Wars .......................................................................................... 86 Sophisticated Ledgers and Smart Contracts ......................................................... 87 ID Correlation Startup Architecture .................................................................. 88 Sovrin Trust Framework ................................................................................ 89 Time and Identity in Physics II......................................................................... 89 Burn it Down and Start Over ........................................................................... 90 Will Smart Contracts Drive Civilization Over a Cliff? ............................................... 93 Demo Hour .................................................................................................. 94 Thank You Note -Takers! .................................................................................. 97 IIWXXIII #23 Photos ......................................................................................... 98 Photo credit #IIW @identitymink IIW 23 Page 2 About IIW The Internet Identity Workshop (IIW) was founded in the fall of 2005 by Phil Windley, Doc Searls and Kaliya Hamlin. It has been a leading space of innovation and collaboration amongst the diverse community working on user-centric identity. It has been one of the most effective venues for promoting and developing Web-site independent identity systems like OpenID, OAuth, and Information Cards. Past IIW events have proven to be an effective tool for building community in the Internet identity space as well as to get actual work accomplished.