SlideShare a Scribd company logo
1 of 25
Download to read offline
The Pan-Canadian Trust Framework
(PCTF) for Self-Sovereign Identity (SSI)
IdentityBook.info special
twitter.com/IdentityBookHQ
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
Tim Bouma
Senior Advisor, Digital Identity
Government of Canada
Dave Roberts
Senior Consultant, Digital Identity
Government of Canada
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
08 June 2020
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Canada: Enabling Self-Sovereign Identity
Identity is at the core of most government business processes and is the starting
point for trust and confidence in interactions between people and their
government.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
The Canadian Approach and Policy Framework
● Adoption of the self-sovereign identity model within the Canadian public sector
is still being realized in 2020.
● It is too early to tell how it will change the technological infrastructure or the
institutional infrastructure of Canadian public services.
● This has not been an overnight process but rather, a deliberate, phased, and
incremental approach over the past decade.
● Government of Canada policy outcomes for identity management, developed
long before the emergence of self-sovereign identity, are general enough to
enable the adoption of SSI.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
The Pan-Canadian Trust Framework
The PCTF, in its most current version, supports the acceptance and mutual
recognition of:
● Digital identities of persons and organizations; and
● Digital relationships between persons, between organizations, and between
persons and organizations.
The PCTF is technology-agnostic and is defined in a way that encourages
innovation and participation in the digital ecosystem. It allows for the
interoperability of different platforms, services, architectures, and technologies. It
will facilitate the transition from legacy identity technologies to SSI within the
public sector.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Public Sector Profile: Key Milestones and Next Steps
1. Pan-Canadian Trust Framework Consultation Draft Version 1.1
• PCTF Working Group Consultation Draft was finalized on June 2, 2020
• Posted on GitHub for broader consultation and review (June 2020 to ?)
• Re-starting PCTF WG Weekly Series
• Focus on Thematic Issues (e.g., Digital Relationships, Informed Consent, Unregistered
Organizations)
2. PCTF Assessment Worksheet
• Consolidation all Conformance Criteria for each atomic process (400+ in total)
• Integration of Organization Conformance Criteria (may be a separate worksheet)
• Continued refinement and validation of Conformance Criteria
3. PCTF Assessment and Mutual Recognition
• Continued iteration of PTCF assessment processes into a a formalized program.
• Exploring alignment with other frameworks (eIDAS, Digital Nations, etc.)
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
The PCTF Model
● A Normative Core component that
encapsulates the key concepts of the PCTF;
● A Mutual Recognition component that outlines
the current methodology that is used to assess
and certify actors in the digital ecosystem;
● A Supporting Infrastructure component that
describes the set of operational and technical
policies, rules, and standards that serve as the
primary enablers of a digital ecosystem; and
● A Digital Ecosystem Roles and Information
Flows component that defines the roles and
information flows within the digital ecosystem.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Identity Domains
● A Foundational Identity is an identity that has been established or changed as a result of a foundational
event (e.g., birth, person legal name change, immigration, legal residency, naturalized citizenship, death,
organization legal name registration, organization legal name change, or bankruptcy).
o The Vital Statistics Organizations (VSOs) of the Provinces and Territories;
o The Business Registries of the Provinces and Territories;
o Immigration, Refugees, and Citizenship Canada (IRCC); and
o The Federal Corporate Registry of Corporations Canada.
● A Contextual Identity is an identity that is used for a specific purpose within a specific identity context
(e.g., banking, business permits, health services, drivers licensing, or social media). Depending on the
identity context, a contextual identity may be tied to a foundational identity (e.g., a drivers licence) or
may not be tied to a foundational identity (e.g., a social media profile).
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Digital Representations
Currently, the PCTF recognizes two types of digital representations:
● Digital Identity: An electronic representation of an entity, used exclusively by that
same entity, to access valued services and to carry out transactions with trust and
confidence.
● Digital Relationship: An electronic representation of the relationship of one entity to
another entity.
As the PCTF evolves these digital representations will be extended to include other types
of entities such as digital assets and smart contracts. It is also anticipated that in the future
the PCTF will be used to facilitate the mutual recognition of digital representations
between countries.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Atomic Process Model ● Atomic processes are crucial building
blocks to ensuring the overall integrity of
the digital identity supply chain and
therefore, the integrity of digital services.
● Atomic processes have been defined in a
way that they can be implemented as
modular services and be separately
assessed for certification.
● Once an atomic process has been
certified, it can be relied on or “trusted”
and integrated into other digital
ecosystem platforms.
● This digital ecosystem is intended to
interoperate seamlessly across different
organizations, sectors, and jurisdictions,
and to be interoperable with other trust
frameworks.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Examples of PCTF Atomic Processes
PCTF Assessment Worksheet
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Dependencies
The PCTF model recognizes two types of dependencies:
● The first type is those dependencies that exist between atomic processes. Although
each atomic process is functionally discrete, to produce an acceptable output an
atomic process may require the successful prior execution of another atomic process.
○ For example, although Identity Establishment of a person or organization can be
performed independently at any time, it is logically correct to do so only after
Identity Resolution for that person or organization has been achieved.
● The second type is dependencies on external organizations for the provision of
atomic process outputs
○ Examples include: a commercial service provider or a credential authentication
service.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Supporting Infrastructure
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Conveyance of Process Output States
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Digital Ecosystem and Information Flows
● The model makes no assumption
on any asymmetric power
relationship between parties.
● Anyone can be subjects, issuers,
holders, and verifiers, using many
different methods.
● The digital ecosystem roles can be
carried out by many different
entities who perform specific roles
under a variety of labels.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Methods
● Methods encompass the sets of rules that govern such things as data
models, communications protocols, cryptographic algorithms, databases,
distributed ledgers, verifiable data registries, and similar schemes; and
combinations of these.
● Methods also include systems that are isolated or have intermittent
connectivity. Within the context of the digital ecosystem, Methods enable
actors to interact directly or indirectly with one another without either party
being bound to a particular solution or technology.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Mapping to Existing Roles
Role Examples
Issuer Authoritative Party, Identity Assurance Provider, Identity
Proofing Service Provider, Identity Provider, Credential Assurance
Provider, Credential Provider, Authenticator Provider, Credential
Service Provider, Digital Identity Provider, Delegated Service
Provider
Subject Person, Organization, Device
Holder Digital Identity Owner, Card Holder
Verifier Relying Party, Authentication Service Provider, Digital Identity
Consumer, Delegated Service Provider
Methods Infrastructure Provider, Network Operator
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Mapping to Emerging Technology Stacks
Trust over IP Stack PCTF Model
Layer 4: Governance Frameworks
Normative Core
Mutual Recognition
Layer 3: Credential Exchange Digital Ecosystem Roles
Layer 2: DIDComm
Supporting Infrastructure
Layer 1: DID Registries
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Federal Digital ID
Directives
● TB Directive on Identity
Management
Standards
● Standard on Identity and
Credential Assurance
Policies
● TB Policy on
Government Security
Legislation
● Financial Administration
Act
Public Sector Profile
Pan-Canadian Trust
Framework
Guidelines and
Technical Standards
● Guideline of Identity
Assurance, Authentication
Requirements
● CATS, ITSP.030.31
Conformance Criteria
Assessment and
Approval
Prov/Terr Digital ID
Directives
Standards
Policies
Guidelines and
Technical Standards
Conformance Criteria
Legislation
For discussion purposes only
National / International Standards
(national in scope with potential for international)
Legislation , Agreements, Treaties, etc.
(e.g. ISO, OECD, WEF, World Bank, etc.)
National / International Digital ID
Assessment and
Approval
Focus: Program Integrity
● Public Interest: specialized
to needs of Public Sector to
ensure trust and confidence.
● Has been tested and revised
based on AB and BC
assessments
● Version 1.1 now available
Focus: Products & Services
● Private Sector-driven: goal
is to encourage
standardized commercial
products and services.
● Remains to be tested
● Version 1.0 pending.
DIACC
Pan-Canadian Trust
Framework
Other Trust
Frameworks
EIDAS (EU)
TDIF (Australia)
Kantara
● There are multiple
international and
industry specific
trust frameworks
● Participating in
Digital Nations
Thematic Group on
Digital Identity
Alignment
Assessment
PCTF Public Sector Profile Assessments: Conducted to Date
Province of Alberta
• April-August 2018 Initial
Assessment
• September 2018: Letter of
Acceptance Issued
• August 2019: Go-Live on My
Service Canada Account
Province of British Columbia
• August-December 2019 Initial
Assessment
• Q1 2020: Letter of Acceptance
Issued (Jan 2020)
• Q1 2020: Go-Live on My CRA
Login (Feb 2020) My Service
Canada Account (Est.)
Rest of Canada
• 2020-202X (Est.)
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
Public Sector Profile of the PCTF: Lessons Learned So Far
1. Requires collaborative team effort with experts on the ground.
• Kick-off involved in-person visit to i) gain direct knowledge of program and ii) establish close working relationship between team
members.
• Regular calls (and videoconferencing) between teams.
• Gathered and compiled evidence using conformance criteria templates submitted for assessment.
• Assessment is a discrete work stream, however tightly coupled to other work streams (technical integration, MOU, agreements etc.)
• Engage legal counsel early in the process, as there will be implications for agreements and authorities.
2. Assessment process is iterative and continuously improving.
• Applying best practices from other frameworks (e.g., security assessment and authorization)
• Development of master spreadsheet to assess evidence against conformance criteria with traceability to policy requirements.
• Evidence collected in separate documents and filed for subsequent analysis, review and audit. Final review results in a Letter of
Acceptance.
3. Next Steps: PCTF is evolving for fit and purpose (we are defining the ‘state of the art’)
• Continue to clarify distinction of responsibilities between departments and jurisdictions. Identifying dependencies with processes in
existing programs (e.g. vital statistics, motor vehicle licensing) and other jurisdictions (e.g., federal immigration).
• Maintain focus of PCTF as a business process integrity framework that complements (not replaces) existing technical interoperability
standards and frameworks (e.g., SAML, Open ID Connect, Verifiable Credentials). PCTF also complements existing assessment processes
or agreements (e.g., Privacy Impact Assessment, Security Assessment and Authorization, SOC2 Trust Principles).
• Ensure PCTF is alignment with global frameworks, World Bank, European Union, Financial Action Task Force (customer due diligence)
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
More Info:
Public Sector Profile of the PCTF is available on GitHub:
https://canada-ca.github.io/PCTF-CCP/
Open Government Licence - Canada:
https://open.canada.ca/en/open-government-licence-canada
Twitter (Tim Bouma):
@trbouma
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
https://www.manning.com/books/self-sovereign-identity and IdentityBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
25
www.IdentityBook.info
@IdentityBookHQ
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/

More Related Content

What's hot

eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanDecentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanSSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
 
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...SSIMeetup
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentBlockchain España
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...SSIMeetup
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
 
The State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellThe State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellSSIMeetup
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
 

What's hot (20)

eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-BryanDecentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
Decentralized governance for SSI and Blockchains with Lawrence Lundy-Bryan
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
 
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...
Trust Frameworks and SSI: An Interview with CULedger on the Credit Union MyCU...
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
 
All you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather VescentAll you need to know about SSI for Corporates and IoT – Heather Vescent
All you need to know about SSI for Corporates and IoT – Heather Vescent
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
The State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’DonnellThe State of Digital Identity Wallets – Darrell O’Donnell
The State of Digital Identity Wallets – Darrell O’Donnell
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 

Similar to The Pan-Canadian Trust Framework (PCTF) for SSI

Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Floyd DCosta
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsIRJET Journal
 
Blockchain and XBRL at the 2017 American Accounting Association presented b...
 Blockchain and XBRL at the  2017 American Accounting Association presented b... Blockchain and XBRL at the  2017 American Accounting Association presented b...
Blockchain and XBRL at the 2017 American Accounting Association presented b...Workiva
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
A REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESA REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESIRJET Journal
 
Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Andrew Coakley
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Floyd DCosta
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Jisc
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsForgeRock
 
Federated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilFederated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilArab Federation for Digital Economy
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionFarhan Farrukh
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategyfEngel
 
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...Craig Borysowich
 
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...Cade Zvavanjanja
 

Similar to The Pan-Canadian Trust Framework (PCTF) for SSI (20)

Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
 
Blockchain and XBRL at the 2017 American Accounting Association presented b...
 Blockchain and XBRL at the  2017 American Accounting Association presented b... Blockchain and XBRL at the  2017 American Accounting Association presented b...
Blockchain and XBRL at the 2017 American Accounting Association presented b...
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
GM_12_161.pptx
GM_12_161.pptxGM_12_161.pptx
GM_12_161.pptx
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
A REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESA REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIES
 
Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
 
Federated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilFederated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation Council
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership Edition
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
 
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
Saigf 15 thematic-paper 7 - A case for multi-stakeholder partnerships for cri...
 

More from SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDSSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3SSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersSSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeSSIMeetup
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
 
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...SSIMeetup
 

More from SSIMeetup (15)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...Indirect Identity Control: delegation, guardianship, and controllership – Dan...
Indirect Identity Control: delegation, guardianship, and controllership – Dan...
 

Recently uploaded

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 

The Pan-Canadian Trust Framework (PCTF) for SSI

  • 1. The Pan-Canadian Trust Framework (PCTF) for Self-Sovereign Identity (SSI) IdentityBook.info special twitter.com/IdentityBookHQ SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/ Tim Bouma Senior Advisor, Digital Identity Government of Canada Dave Roberts Senior Consultant, Digital Identity Government of Canada
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives 08 June 2020
  • 3. https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
  • 4. Canada: Enabling Self-Sovereign Identity Identity is at the core of most government business processes and is the starting point for trust and confidence in interactions between people and their government. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 5. The Canadian Approach and Policy Framework ● Adoption of the self-sovereign identity model within the Canadian public sector is still being realized in 2020. ● It is too early to tell how it will change the technological infrastructure or the institutional infrastructure of Canadian public services. ● This has not been an overnight process but rather, a deliberate, phased, and incremental approach over the past decade. ● Government of Canada policy outcomes for identity management, developed long before the emergence of self-sovereign identity, are general enough to enable the adoption of SSI. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 6. The Pan-Canadian Trust Framework The PCTF, in its most current version, supports the acceptance and mutual recognition of: ● Digital identities of persons and organizations; and ● Digital relationships between persons, between organizations, and between persons and organizations. The PCTF is technology-agnostic and is defined in a way that encourages innovation and participation in the digital ecosystem. It allows for the interoperability of different platforms, services, architectures, and technologies. It will facilitate the transition from legacy identity technologies to SSI within the public sector. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 7. PCTF Public Sector Profile: Key Milestones and Next Steps 1. Pan-Canadian Trust Framework Consultation Draft Version 1.1 • PCTF Working Group Consultation Draft was finalized on June 2, 2020 • Posted on GitHub for broader consultation and review (June 2020 to ?) • Re-starting PCTF WG Weekly Series • Focus on Thematic Issues (e.g., Digital Relationships, Informed Consent, Unregistered Organizations) 2. PCTF Assessment Worksheet • Consolidation all Conformance Criteria for each atomic process (400+ in total) • Integration of Organization Conformance Criteria (may be a separate worksheet) • Continued refinement and validation of Conformance Criteria 3. PCTF Assessment and Mutual Recognition • Continued iteration of PTCF assessment processes into a a formalized program. • Exploring alignment with other frameworks (eIDAS, Digital Nations, etc.) SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 8. The PCTF Model ● A Normative Core component that encapsulates the key concepts of the PCTF; ● A Mutual Recognition component that outlines the current methodology that is used to assess and certify actors in the digital ecosystem; ● A Supporting Infrastructure component that describes the set of operational and technical policies, rules, and standards that serve as the primary enablers of a digital ecosystem; and ● A Digital Ecosystem Roles and Information Flows component that defines the roles and information flows within the digital ecosystem. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 9. PCTF Identity Domains ● A Foundational Identity is an identity that has been established or changed as a result of a foundational event (e.g., birth, person legal name change, immigration, legal residency, naturalized citizenship, death, organization legal name registration, organization legal name change, or bankruptcy). o The Vital Statistics Organizations (VSOs) of the Provinces and Territories; o The Business Registries of the Provinces and Territories; o Immigration, Refugees, and Citizenship Canada (IRCC); and o The Federal Corporate Registry of Corporations Canada. ● A Contextual Identity is an identity that is used for a specific purpose within a specific identity context (e.g., banking, business permits, health services, drivers licensing, or social media). Depending on the identity context, a contextual identity may be tied to a foundational identity (e.g., a drivers licence) or may not be tied to a foundational identity (e.g., a social media profile). SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 10. PCTF Digital Representations Currently, the PCTF recognizes two types of digital representations: ● Digital Identity: An electronic representation of an entity, used exclusively by that same entity, to access valued services and to carry out transactions with trust and confidence. ● Digital Relationship: An electronic representation of the relationship of one entity to another entity. As the PCTF evolves these digital representations will be extended to include other types of entities such as digital assets and smart contracts. It is also anticipated that in the future the PCTF will be used to facilitate the mutual recognition of digital representations between countries. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 11. PCTF Atomic Process Model ● Atomic processes are crucial building blocks to ensuring the overall integrity of the digital identity supply chain and therefore, the integrity of digital services. ● Atomic processes have been defined in a way that they can be implemented as modular services and be separately assessed for certification. ● Once an atomic process has been certified, it can be relied on or “trusted” and integrated into other digital ecosystem platforms. ● This digital ecosystem is intended to interoperate seamlessly across different organizations, sectors, and jurisdictions, and to be interoperable with other trust frameworks. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 12. Examples of PCTF Atomic Processes PCTF Assessment Worksheet SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 13. PCTF Dependencies The PCTF model recognizes two types of dependencies: ● The first type is those dependencies that exist between atomic processes. Although each atomic process is functionally discrete, to produce an acceptable output an atomic process may require the successful prior execution of another atomic process. ○ For example, although Identity Establishment of a person or organization can be performed independently at any time, it is logically correct to do so only after Identity Resolution for that person or organization has been achieved. ● The second type is dependencies on external organizations for the provision of atomic process outputs ○ Examples include: a commercial service provider or a credential authentication service. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 15. Conveyance of Process Output States SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 16. Digital Ecosystem and Information Flows ● The model makes no assumption on any asymmetric power relationship between parties. ● Anyone can be subjects, issuers, holders, and verifiers, using many different methods. ● The digital ecosystem roles can be carried out by many different entities who perform specific roles under a variety of labels. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 17. Methods ● Methods encompass the sets of rules that govern such things as data models, communications protocols, cryptographic algorithms, databases, distributed ledgers, verifiable data registries, and similar schemes; and combinations of these. ● Methods also include systems that are isolated or have intermittent connectivity. Within the context of the digital ecosystem, Methods enable actors to interact directly or indirectly with one another without either party being bound to a particular solution or technology. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 18. Mapping to Existing Roles Role Examples Issuer Authoritative Party, Identity Assurance Provider, Identity Proofing Service Provider, Identity Provider, Credential Assurance Provider, Credential Provider, Authenticator Provider, Credential Service Provider, Digital Identity Provider, Delegated Service Provider Subject Person, Organization, Device Holder Digital Identity Owner, Card Holder Verifier Relying Party, Authentication Service Provider, Digital Identity Consumer, Delegated Service Provider Methods Infrastructure Provider, Network Operator SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 19. Mapping to Emerging Technology Stacks Trust over IP Stack PCTF Model Layer 4: Governance Frameworks Normative Core Mutual Recognition Layer 3: Credential Exchange Digital Ecosystem Roles Layer 2: DIDComm Supporting Infrastructure Layer 1: DID Registries SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 20. Federal Digital ID Directives ● TB Directive on Identity Management Standards ● Standard on Identity and Credential Assurance Policies ● TB Policy on Government Security Legislation ● Financial Administration Act Public Sector Profile Pan-Canadian Trust Framework Guidelines and Technical Standards ● Guideline of Identity Assurance, Authentication Requirements ● CATS, ITSP.030.31 Conformance Criteria Assessment and Approval Prov/Terr Digital ID Directives Standards Policies Guidelines and Technical Standards Conformance Criteria Legislation For discussion purposes only National / International Standards (national in scope with potential for international) Legislation , Agreements, Treaties, etc. (e.g. ISO, OECD, WEF, World Bank, etc.) National / International Digital ID Assessment and Approval Focus: Program Integrity ● Public Interest: specialized to needs of Public Sector to ensure trust and confidence. ● Has been tested and revised based on AB and BC assessments ● Version 1.1 now available Focus: Products & Services ● Private Sector-driven: goal is to encourage standardized commercial products and services. ● Remains to be tested ● Version 1.0 pending. DIACC Pan-Canadian Trust Framework Other Trust Frameworks EIDAS (EU) TDIF (Australia) Kantara ● There are multiple international and industry specific trust frameworks ● Participating in Digital Nations Thematic Group on Digital Identity Alignment Assessment
  • 21. PCTF Public Sector Profile Assessments: Conducted to Date Province of Alberta • April-August 2018 Initial Assessment • September 2018: Letter of Acceptance Issued • August 2019: Go-Live on My Service Canada Account Province of British Columbia • August-December 2019 Initial Assessment • Q1 2020: Letter of Acceptance Issued (Jan 2020) • Q1 2020: Go-Live on My CRA Login (Feb 2020) My Service Canada Account (Est.) Rest of Canada • 2020-202X (Est.) SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 22. Public Sector Profile of the PCTF: Lessons Learned So Far 1. Requires collaborative team effort with experts on the ground. • Kick-off involved in-person visit to i) gain direct knowledge of program and ii) establish close working relationship between team members. • Regular calls (and videoconferencing) between teams. • Gathered and compiled evidence using conformance criteria templates submitted for assessment. • Assessment is a discrete work stream, however tightly coupled to other work streams (technical integration, MOU, agreements etc.) • Engage legal counsel early in the process, as there will be implications for agreements and authorities. 2. Assessment process is iterative and continuously improving. • Applying best practices from other frameworks (e.g., security assessment and authorization) • Development of master spreadsheet to assess evidence against conformance criteria with traceability to policy requirements. • Evidence collected in separate documents and filed for subsequent analysis, review and audit. Final review results in a Letter of Acceptance. 3. Next Steps: PCTF is evolving for fit and purpose (we are defining the ‘state of the art’) • Continue to clarify distinction of responsibilities between departments and jurisdictions. Identifying dependencies with processes in existing programs (e.g. vital statistics, motor vehicle licensing) and other jurisdictions (e.g., federal immigration). • Maintain focus of PCTF as a business process integrity framework that complements (not replaces) existing technical interoperability standards and frameworks (e.g., SAML, Open ID Connect, Verifiable Credentials). PCTF also complements existing assessment processes or agreements (e.g., Privacy Impact Assessment, Security Assessment and Authorization, SOC2 Trust Principles). • Ensure PCTF is alignment with global frameworks, World Bank, European Union, Financial Action Task Force (customer due diligence) SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 23. More Info: Public Sector Profile of the PCTF is available on GitHub: https://canada-ca.github.io/PCTF-CCP/ Open Government Licence - Canada: https://open.canada.ca/en/open-government-licence-canada Twitter (Tim Bouma): @trbouma SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 24. https://www.manning.com/books/self-sovereign-identity and IdentityBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org