Blockchain digital authentication platform WISeID: Provide legal digital identity for everyone by 2030

Blockchain digital authentication platform WISeID: Provide legal digital identity for everyone by 2030

On June 7, Swiss cybersecurity company WISeKey announced the official launch of a digital and network authentication APP based on blockchain technology - WISeID.

The dual factor authentication technology [1] used by WISeID is based on blockchain technology, forming the WISeID Blockchain. As new information is entered, the number of blocks in the WISeID Blockchain continues to increase. Each node contains information from all blocks and can automatically download records after connecting to the WISeID network.

The core technology of this platform is the OISTE-WISeKey Cryptographic Root of Trust. Since 1999, more than 26亿computers, browsers, mobile devices, SSL certificates and IoT devices have been using this technology. This cryptographic root of trust is widely used and is a pioneer in the field of digital identity creation. The project was launched in 2007 by the non-profit organization OISTE Foundation (dedicated to digital authentication), WISeKey and the Clinton Global Initiative [2] . At that time, the poor accounted for五分之一the world's total population, 15亿people had no legal identity, and 5000万children were born every year without birth certificates and legal identity. The goal of this project was to provide them with 1 billion legal identities.

Without a legal identity, people cannot enjoy basic economic services, and even cannot get education and medical services. The WISeID blockchain platform combines the latest technologies and digital identity with blockchain technology. Based on the United Nations (UN) Sustainable Development Goals [3] , its goal is to provide a reliable digital identity for everyone in the world by 2030年First, the United Nations will launch an identity authentication system by 2020.

The WISeID blockchain platform will work in conjunction with WISeID Kaspersky Lab Security Cyber ​​Resilient Edition, a cyber resilient application that locks personal data such as account names and passwords, credit card numbers and personal identification numbers (PINs) in a secure personal data vault, providing reliable authentication of users' online behavior while ensuring that personal data is securely stored in the cloud.

Notes (↵ returns to text)

  1. Two-factor authentication is a security process in which a user provides two pieces of identity, one that is usually carried with them, such as a card, and another that is usually remembered, such as a secure password. In this context, the two factors involved are sometimes referred to as something you have or know. A common example of two-factor authentication is a bank card: the card itself is the physical object, and the personal identification number (PIN) is the data that accompanies it. ↵

  2. The Clinton Global Initiative (CGI) was founded by former US President Bill Clinton in 2005. It is a non-governmental organization independent of the Clinton Foundation. It aims to gather the wisdom and resources of leaders from all walks of life around the world, and is committed to promoting people to explore global issues and promote shared responsibilities around the world. It especially emphasizes turning ideas into actions, responding to a series of global challenges, and solving global problems. ↵

  3. The Sustainable Development Goals (SDGs) are a set of goals for international development set by the United Nations that will replace the Millennium Development Goals at the end of 2015. The goals will run from 2015 to 2030. There are 169 specific targets in this set of goals. ↵


<<:  Bitcoin Core fully supports BIP152, and high bandwidth mode greatly improves block propagation speed

>>:  Coin Zone Trends: Bitcoin Price Trends Based on Big Data This Week (2016-06-8)

Recommend

Men with moles under their belly buttons are usually handsome.

Is it good for a man to have a mole under his bel...

Halving Economics: What Will Happen to the Bitcoin Price?

By Dominik Stroukal Compiled by: Shared Finance N...

Are the wrinkles on the chin good wrinkles? What is the impact?

It is normal for people to get wrinkles on their ...

How to read the forehead lines and what is the basis

People with forehead lines are quite likable in l...

Which one is the lifeline?

There are all kinds of lines on the hands. For so...

What kind of woman is suitable for dating an older man?

Nowadays, more and more girls are marrying older ...

How to make up for facial imperfections

How to make up for facial imperfections In fact, ...

It is impossible for a worker to choose to start a business

For many people, working part-time is actually a ...

Fingers in palmistry

People have two hands, each containing a Tai Chi....

How to give value to coins?

If you issue a coin, how do you make it valuable?...

USDT will not crash

USDT is the biggest bomb in the market. This shou...

The Golden Age of Bitcoin Mining? CoinNet’s Views on Future Hashrate Trends

At 10:00 am on November 24, 2015, the difficulty ...

Women with this kind of face are likely to raise prodigal sons

In fact, raising children requires more than just...

Delta 1300W Power Supply Review

Power supply model: DPS-1300BB B Brand: Delta Rat...

How to read palmistry diagram, mastering these points is very important

For some people who don't know much about palm...