Blockchain digital authentication platform WISeID: Provide legal digital identity for everyone by 2030

Blockchain digital authentication platform WISeID: Provide legal digital identity for everyone by 2030

On June 7, Swiss cybersecurity company WISeKey announced the official launch of a digital and network authentication APP based on blockchain technology - WISeID.

The dual factor authentication technology [1] used by WISeID is based on blockchain technology, forming the WISeID Blockchain. As new information is entered, the number of blocks in the WISeID Blockchain continues to increase. Each node contains information from all blocks and can automatically download records after connecting to the WISeID network.

The core technology of this platform is the OISTE-WISeKey Cryptographic Root of Trust. Since 1999, more than 26亿computers, browsers, mobile devices, SSL certificates and IoT devices have been using this technology. This cryptographic root of trust is widely used and is a pioneer in the field of digital identity creation. The project was launched in 2007 by the non-profit organization OISTE Foundation (dedicated to digital authentication), WISeKey and the Clinton Global Initiative [2] . At that time, the poor accounted for五分之一the world's total population, 15亿people had no legal identity, and 5000万children were born every year without birth certificates and legal identity. The goal of this project was to provide them with 1 billion legal identities.

Without a legal identity, people cannot enjoy basic economic services, and even cannot get education and medical services. The WISeID blockchain platform combines the latest technologies and digital identity with blockchain technology. Based on the United Nations (UN) Sustainable Development Goals [3] , its goal is to provide a reliable digital identity for everyone in the world by 2030年First, the United Nations will launch an identity authentication system by 2020.

The WISeID blockchain platform will work in conjunction with WISeID Kaspersky Lab Security Cyber ​​Resilient Edition, a cyber resilient application that locks personal data such as account names and passwords, credit card numbers and personal identification numbers (PINs) in a secure personal data vault, providing reliable authentication of users' online behavior while ensuring that personal data is securely stored in the cloud.

Notes (↵ returns to text)

  1. Two-factor authentication is a security process in which a user provides two pieces of identity, one that is usually carried with them, such as a card, and another that is usually remembered, such as a secure password. In this context, the two factors involved are sometimes referred to as something you have or know. A common example of two-factor authentication is a bank card: the card itself is the physical object, and the personal identification number (PIN) is the data that accompanies it. ↵

  2. The Clinton Global Initiative (CGI) was founded by former US President Bill Clinton in 2005. It is a non-governmental organization independent of the Clinton Foundation. It aims to gather the wisdom and resources of leaders from all walks of life around the world, and is committed to promoting people to explore global issues and promote shared responsibilities around the world. It especially emphasizes turning ideas into actions, responding to a series of global challenges, and solving global problems. ↵

  3. The Sustainable Development Goals (SDGs) are a set of goals for international development set by the United Nations that will replace the Millennium Development Goals at the end of 2015. The goals will run from 2015 to 2030. There are 169 specific targets in this set of goals. ↵


<<:  Bitcoin Core fully supports BIP152, and high bandwidth mode greatly improves block propagation speed

>>:  Coin Zone Trends: Bitcoin Price Trends Based on Big Data This Week (2016-06-8)

Recommend

The way you speak reflects your personality

The way you speak reflects your personality Do yo...

How to read men's eyebrows

For a person, although eyebrows are a part that i...

People who like to make fun of their brothers

There needs to be a certain distance between frie...

Facial features of people with a very serious tendency to be self-enclosed

Society is made up of communication, and only wit...

What is the saying about women with thick eyebrows?

Eyebrows are the most important of the five facia...

PoW may seem outdated, but innovation has not stopped

Kaspa, a new PoW project, has performed well rece...

What does it mean to have red moles on your body?

Each of us has moles on our bodies, and the prese...

Announcement | Qitmeer Medina Network 2.0 is officially launched

Dear Qitmeer community users, Qitmeer Medina Newt...

Chinese speculation triggers another surge in Bitcoin prices

According to foreign media reports, the enthusias...

The facial features of a woman with a happy marriage

In physiognomy, different facial features represe...

How to read a man's face

As the saying goes: Men are the biggest eaters; s...

Filecoin stands at a crossroads

Juan, founder of IPFS & Filecoin, said in his...

Coin Zone Trends: Bitcoin Price Trends Based on Big Data This Week (2016-12-15)

The trend of long and short tug-of-war is unclear...