KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
For the introduction and I'm very happy to be here. My name ISTI, I work with Ida foundation and the head of telco infrastructure development. I've been in this role for more than a year before I was technical Analyst, Analyst Analyst supporting the work in the global tenant supply chain. So we have done quite a few projects that I want to present to you and have a bit of discussion around that. First of all, we were being used to basically live in a world where digital entities is mainly manage into centralized and silo ecosystem.
So we have identity and access manager management providers that basically collect information and verify information about individuals. So they have to store and verify personal data, and then they have to generate access credential for different service provider that basically leverage on the work done by identity and access provider to provide services.
So they gain a service that is identity service, and they, to in alternative, deploy their own system with the cost that this, this will require on the last end of the spectrum, we, we used to have identity owners like individual, but now we see an emergence NCE of objects and organization identity as well with all of these requiring us to register, keep up to date our information across a number of different identity management provider, a different provider. So with some kind of fatigue from our side, and also losing on our and where our data goes, these are centralized and ecosystem.
There is good and bad in this approach so far. So, so far, we have been having identity provider that have to invest in identification and generate revenues out of this, out of the world that they do to verify identities. But on the other end, we have seen creation of monopolies. Like now the social idea that Facebook and Google can provide. And I know a lot of about people and many more service are relying on that. And eventually are facing increase of security and compliance burden comes from GDPR general ation information on the other web.
And we have service provider that of course can now leverage verified customers, verified entities, depending on actually where the provider get information. So there are different level of assurance with different providers, but the benefits that they get is basically having verified customers, but they still face integration, cost and complexity that also depend on. And also they depend on third party. So third party identity provider. So if the service is not available, they're not able to, to verify their customer.
And finally, we have identity owner that of course have that personal data spread across systems. They start to suffer password S every time we need to update our, the data, we need to remember password. We need to remember where they are store and so on and so forth. And we've start at risk of being track, especially when this information can be combined. And definitely we lose on, on, on our data.
Our, in our data use beyond the boundaries of identity service that is provided. There is a complete new way of seeing this ecosystem that now is trying to breaking down silos and create more open ecosystem. We all recognize the importance of three different factors that are the issuer, those that still have identity knowledge, and that can issue entities. Second issue, verifiable credential. We have other parties that are the service provider now, but we call verify those that actually want to verify that individual own specific credential.
And they can confirm that in this of this credential, but we have a new means to, to transfer this information. We have distributed ledgers in this case, the one we develop and we provide this, but basically now the service become the layer of trust that allow to trust issue. I entities trust older identifiers and trust credential that issues are to issue to in way that becomes much more accountable and verifiable without complex integration, and also allow holder to start to bring and collect different credential from different issues.
So this definitely create a new ecosystem where three parties basically before the service provider have to work with issuer of entities and then on board holder. Now it's actually the older that can be empowered to carry around its own identity can become the, the connection point between different ecosystem, different ware and creator of identities and differents and service provider. This definitely brings some benefit. This bring the ability to minimize personal data sharing. So now we don't need to go to every different service.
So identity identity provider that the service provider decide to work with and to board and share again, our information. So our information can only sit with one of you identity provider and this being the individual in between this ecosystem, bringing its information to the very buyer with a trusted ledger gives the centralized disability ledger technology gives allow to minimize personal data sharing, of course, simplify integration, because now all integration point become not the many different service identity provider, but become ledger.
So especially looking into standardized way like the WC standard for the centralized identity credential provider, we start to see a normality of way of getting information about entities and verifiable credential and as a result. Anyway, there is a change in ecosystem because it's clear that now there is no more probably direct relation verified and identity provider issuer, but the middleman entry point that brings this information become the user. So there is a change in the existing business model.
So there is no more a relation between service provider that require the service of identity provider can actually be charged and pay for the cost of the service. So this service now become a bit more fluid and there is a way to identify new business model that allow to keep engaged issuer, to provide the service of verifying identity issue credential, but not having that interconnection with the service provider like this in this case, they verify.
So this required to prove the value of this new ecosystem, new identity ecosystem, and eventually identify new business model to allow this to flush. So for this reason, as I said, we need to try to break the barrier on our identity as been conceived and, and works so far.
And we, we say that definitely we have needs for technical standard that are actually under development in different bodies. W is one of these that allow to guarantee a first layer of interoperability because the ledger become the entry point for interconnecting, all this player in ecosystem. We definitely have regulatory change as well. That will push more and more towards this decentralized way of seeing identity.
Especially there is work done in the, a framework from the European commission and also the new let's say, pan European infrastructure that C European blockchain service infrastructure will provide. So new regulation for identity and credential wallet are, can being discussed. So people in Europe at least will be expected to a wallet for storing their credential and then moving them from issuer to by 2022. And there is one last element that we have to focus in the time. In the meantime, it's about proving the value and defining new business model.
That is actually the creation of collaborative ecosystem. So we need to find our way for minimum viable ecosystem of issuer owner of identity, and to work together and to identify what are actually the new way for them to cooperate and still gain value from this new way of, of working that is especially key for keeping issuer, participating to ecosystem. And the key for the, for this new way of managing identity will succeed. So we identifying this and the work we are doing mainly resolve around public funding and collaborative innovation. And I'm going to present few ways.
We are working and try to understand the benefit of the centralized identity in this context. One quick note, I want to give around identity centralized identity and why Iotta is a good fit. A Iotta is not anymore blockchain. So disability ledger maintains the same property, but brings also some benefit that are particular true in terms of scalability, the efficiency of the ledger, and this also help very well in meeting the requirement of the centralized identities because of the scalability and also the easy to use. So there is no more, any token needed to use the, the ledger itself.
So, and this field. So it allowed to scale to the I number of identities that this ecosystem I present will have to satisfy in future. Especially if we think about personal identities, object, and organizational identity, it will all work as centralized. We definitely have possibility to work in permission and the permissionless environment and as well, we are definitely try to bring collaborative ecosystem on top of an open source platform.
Identities, as I said, is a framework based on standards and it provide easy to integration with the SDK, but also APIs that allow issuer to connect to, to the ledger in the same very hires is based on an organization that register in Germany, which is not for profit. So we think that it can actually help to foster this kind of collaboration. So going back now to some of the scenario where we are starting to, to explore and understand the value of the centralized identities, these are few few examples. So there is one of the project we are currently working is called ensure.
Sec, ensure is targeting eCommerce and security and safety of customers as well. Goods in the eCommerce, in the eCommerce of course, prevention of fraud and other cyber physical threat can, can be improved if it can rely on secure verifiable identities of involved platform. And we are now try to understand what kind of value, what kind of new business model the central identity can bring, especially in terms of age and benefits, verification, when customer need to purchase goods on some e-commerce domain that actually are basically limiting the, the sale to only people above 18.
For instance, only people having particular let's say DCS in terms of medication that the requirements on and so forth, as well as we are using identity for tracking correct delivery to the right person with specific process of delivery, as well as seller onboard.
So, but in general, the overall concept here is that we see that banks already knows customers, and basically customers can gather from their, their banks credential that states in this case, the example we're trying with their reach, and they can basically log into eCommerce domain for instance, and, and from eCommerce domain can definitely buy product that are age limited delivered by age and the customer, the seller can easily verify the fact that these customers are 18 without requesting any information or maintaining any information.
So the benefit that this brings to this overall ecosystem, there is still of course understand the role of bank, but having a distributed ledger underneath that allow to trace every request of verification of credential back to the, to the owner of this, the issue of this credential can help with the final business model, ASU go model that we are experimenting. But definitely the benefit that we see is that small, medium sellers in eCommerce, they will not need anymore to collect personal information. They will not need anymore to store information.
And to show that the have compliance with GDPR regulation, other security requirement store information that can actually be a burden for small and medium cells. So there is already value that is we see emerging from this side can also help to compensate the work that issuer doing. So we are keep experimenting testing. And the result outcome of this product is a to European product will see some, some solution at the end in, in, in that domain. So another approach we did work with large car manufacturers, mark car manufacturer like zebra.
So we propose a car that is basically holding a green pass, a digital green certificate for people that actually don't want to use mobile phone. Again, here we exploit the concept of distributed decentralized entities in partnership with zebra and try to see also we compliment with work done at the European level with the, with the European gateway. Again here, we think that the value brought by, by this way of managing green pass and certificate will bring much more interoperability across member state outside of Europe as well.
And as well definitely will bring the, the, the ability for, for issuer to be the, the, those that verify that actually the vaccine is already issued with the right to the right person. So without having the burden of this control.
So again, here we are trying to understand in, we already know there are green plastic season, how this can bring value, also keeping involved the all different factors, especially they issue the vaccination center are part of this.
We are also exploring the use of centralized identity in terms of pairing them with our smart government and try to give much more, let's say, accurate data and information, especially in case of worker working and critical infrastructure worker in a very difficult working condition, like mines, the mines industry, not the mine from mining Bitcoin or whatever, but the mining of precious metal in this case.
So with the use of the centralized identity, again, we see that I OT provider and for instance, telecommunication operator can work together in order to, to develop new and more trusted identity for, for the data that on from is variable device and provide more, let's say timely response to that needs in the work environment. I think going to the, to the idea of linking identities and as well, object and I IOT, we are exploring the market of smart metering as well.
And this market, we are actually see what will be the value of connecting identities, that link to the customer as smart meter in a new way of selling energy appear tope energy marketplace, where basically identity for smart meters need to be temper proof and need to be used as well to track energy production and green energy production reward their, their participant and their owner to sharing of energy, to make cities much more sustainable. So all of this can be done if there is a strong link between identities of people and owner and sorry, smart meter that we're exploring here.
I think, yeah, I thought it was too much. One last one is that basically it's some fruit for thoughts, and we are also doing some work in the telecommunication forum because like I present before one of the key issuer of identity credential that allow this movement of information from issuer to verify without me to interconnect, but just relying around the user that becomes really the user centric approach to identity it's with a telecommunication operator, telecommunication operator already know very well customer for their onboarding and KC procedure.
And of course now they have a new let's say tool, which is the, the EC that is taking place is currently being deployed in, in new phones that allow to be the EC. Now the collector of this credential that states attribute about customer that a user can have.
And the, the novelties that now, again, if you want to link this identity to something that person owns as well is not only in software, but it, this can also be moved across device very easily. And as well, when we let's say change phone, our then does in disappear. So this what we are actually now exploring with, with a telco industry, if you can see the telco could become an identity provider and identity as a service provider, that's pretty much about it as a summary of the person and the organization we work.
And yeah, I'm very happy if our question to be answered now or later during this session.