Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang

Slides:



Advertisements
Similar presentations
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Advertisements

International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
Tuesday, 29 April 2014 Ministry Of Interior MOI In addition to traditional peace keeping and civil defense duties, the Saudi Arabian Ministry Of Interior.
Banking Addressing Standard 2.0
FDIC Money Smart for Young Adults
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
FIT3105 Smart card based authentication and identity management Lecture 4.
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
What kinds of Information do you carry?? Have you ever heard about Ubiquitous Society??
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
Protecting your money: Identity Theft
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
The FPLS Portal: Our Next Level of Communication Presented by: Scott Hale Debbie Edwards Linda Hudson Todd Smith.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
Payroll Taxes and Forms
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
Florida Information Protection Act of 2014 (FIPA).
Identification Verification. Verification Required Election Day Registration Mail-in Only if Driver’s License # or Social Security # does not validate.
DIGITAL SIGNATURE.
e-Breeder Documents – closing the gap in the identity management chain
Verification of Eligibility for Public Benefit Technical College System of Georgia Office of Adult Education FY2013.
How to Check Your Andhra Card Information
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
MudiamPCI provide the solution for SAP credit card processing, payment card and card tokenization with aes 256 encryption.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Module 1 Version:1.3_ Release date:
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Smart Data infrastructure
Sandy Porter - Strategy Director Avoco Secure
Using Technology to provide an innovative sustainable model for delivery of Cashless Health Insurance                              r r r r r y y g s s.
Public Key Infrastructure (PKI)
Learning Objectives Today we will Learn:
Grid Security.
Florida Information Protection Act of 2014 (FIPA)
Outline What does the OS protect? Authentication for operating systems
Summary Physical Access & Time and Attendance PC/Network Access
THE STEPS TO MANAGE THE GRID
Outline What does the OS protect? Authentication for operating systems
Digital Signature.
Florida Information Protection Act of 2014 (FIPA)
Quickbooks is a private finance management tool that hold track of finance, income and expenses that occur over a period of time. The Quickbooks is responsible.
Cryptocurrency Mobile Wallet Development Company
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Scams and Schemes.
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Who Uses Encryption? Module 7 Section 3.
NAAS 2.0 Features and Enhancements
Privacy and Information
Emma Pham, Anna Cottone, Tailai Zhang, Scott Covington
Legal Framework for Civil Registration, Vital Statistics
Other Sources of Information
Distributed Ledger Technology (DLT) and Blockchain
SOLUTION ID CARDS AND DRIVER’S LICENSES
Driver License Division Management Team Houston, TX
A New Technology for Video Surveillance Cameron Serles
ALIO ARCHIVE ANDREW DANIEL.
Electronic Commerce.
Issue Verifiable Digital Records.
Pacific Regional Workshop on Legal Identity and Identity Security 8-10th July 2019 PALAU Efrecia R. Kazuma.
SDMX IT Tools SDMX Registry
Presentation transcript:

Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang

Identity Card – Public Key About Our Company What is ? What does do? Security technology company Software developer Contractor to the U.S. government Manages transfer of personal identity onto the blockchain Maintains identity records on blockchain Facilitates verification of identity From many identity cards.. To one Public Key… 8181 3268 159E 51D1 Identity Card – Public Key

transfers personal identity verification of identity How it works transfers personal identity onto the blockchain 1 facilitates verification of identity 2 2018 2019 2020 2036 Babies born Adults Adults Turn 18 yrs old Birth record and biometric data are created Identity is encrypted with private key and added to Blockchain Parents can access private key, if needed Identity is put on Blockchain due to: Marriage license Passport issuance Criminal record Drivers license Adults can use keys to prove identity and institutions can verify identity using interface Private key is transferred from parents to child Biometric data is updated Identify can now be verified via interface

Feasibility Technical Gov’t / Societal Software Customized blockchain interfaces for: hospitals/clinics (birth) county clerk (marriage) USPS/Dept of State (Passport) DMV (Drivers license) Law Enforcement Agency (Criminal record) API for Institutions Hardware Hardware security modules (stores private keys) Mining Machines Data Centers Integrated biometric machines Biometric Collection tools/technologies Analysis of human biometrics into code Biometrics to authorize private key Government investment Common standards across all government agencies Adoption of institutions (e.g., financial) General public learning curve

Solution to Current State Inefficiencies Inconvenient: Many forms of ID issued by various entities SSN was created to track a worker’s lifetime earnings NOT to be a national identity card One single identity verification tool – public key Insecure: Widely shared, printed, and stored Carnegie Mellon researchers published an algorithm that can reconstruct SSN based on publicly available personal info Secure ecosystem using blockchain technology Biometrics and passcode for verification