The problem with identity and its safeguard has been troubling mankind since the barter system. Isn’t it? Can I say that one of the main causes for all the wars waged since time immemorial has been for identity? With the evolution and exponentially increasing ways of stealth procedures, identity protection is becoming tough.
We believe that one’s identity is one’s most valuable possession and that identities are to be protected in better ways and they’ve to be protected by individuals themselves. We will guide you on how to do the same in the next couple of minutes.
OneID has been built to create the kind of environment where the identity owner has total discretion in managing and disclosing important private details about herself to some entity either in full or in parts as the requirement and the situation deems necessary. In short, OneID enables not disclosing all of the identity owner’s information at all times, unlike most other prevalent methods.
If we examine the current context, we always end up sharing more about us and attributes related to us. A generic example could be a bank identity that is valid if and when the identity owner attaches the recent bank statement which reveals your financial habits. Over and above, it might even disclose the places identity owner has made financial transactions, thus raising serious privacy concerns. The same is the case with any day-to-day activity in which we are asked to produce our identity on demand.
The world has felt that with technological advancements, this problem shall get solved, and it seemed to be so when it is a niche. But, with AI advancements at a breakneck pace, and mankind making more and more thinking machines out of silica, the density of thinking capacities has increased compared to yesteryears thereby increasing the threat too. Users are being skewed to use one’s service so as to maintain an identity and vice versa. But, identity can be protected and of course, it can easily be stolen too. So OneID came with a distinctive approach where we can share the identity attributes on demand in such a way that only information required shall be sent for verification, all within the control of the identity owner.
Now in this world of cloud computing, identity protection strategies are becoming deodand. And, it’s time to replace every inch of it by bringing back the rights into the identity owner’s custody instead of a cloud maintained by a third party. So, the way identity is stored will differ and the way identity is shared shall also differ and everything under the watchful eyes of authentic stakeholders, identity holder.
Putting it in layman’s terms’, identity owner shall still store their data in a wallet that is safe & secure through post-quantum cryptography design principles and adhere to the W3Cstandards. But, the stark difference that props up over here is that only on a request from the service provider the requisite data will be shared with the consent of the identity owner. The part data which is being shared shall be cryptographically attested by identity providers or trusted authorities who are also a part of this network which guarantees the genuinity of the identity. The fact to be understood over here, we are not sharing any single document in full until & unless required. This shall not only bring efficient management of the data but brings ineffective information security into place by default.
Present, identity wallets are mere storage spaces in the cloud that are being allotted to a user but when identity is to be shared, it is ought to be shared in whole, with high chances where even the identity owner can bypass some checks as the identity shared is not attested by the party who has given the same to the holder on first hand. The stakeholders who create identities for people or things viz., government agencies take the utmost care while creating the identity document and disbursing the same. A lot of effort goes into ensuring that identity issued to an individual is valid, but loses control over it once it gets issued. Can we bring a change where Identity Providers get truly incentivized for their efforts in maintaining the identities of people? With OneID in place, they can help the businesses who ask for identities by attesting the identity time and again which will even create a new business model for these identity providers who in general get nothing out of creating IDs.
Their groundwork is becoming fruitful for services that need an identity from a user before allowing them to avail a service. On the other hand, these service providers invest heavily in terms of human resource and software, machinery to collate all these identities and do KYC on a regular basis for a document that has been given by a trusted party without the help of the later. Here, the identity provider shall not hold accountability if in case the user has altered any data stating it is the duty of the concerned service provider to verify the authenticity. Now, this is a never-ending game where the service provider doesn’t get the data duly attested by the stakeholder who generated the identity on the first hand and on the other side, the stakeholder is making no monetary benefits once it is generated and disbursed to the user.
Applying this scenario to various domains we shall easily get the gist of the exponential benefits that OneID brings along viz., verification of academic certificates before onboarding an employee, accepting a credit card application.
OneID is striving to safeguard, secure, and inculcate the ability to share the identities in a fool-proof manner. With the advent of information technology and its supporting products, society has become lenient and is expecting machines to take care of each and everything. Whilst in the past, we know that our previous generations had the habit of preserving every sort of document; a letter or whatsoever related to them in their personal drawer until that document ceases to exist. It is because they want to have anything related to them only under their possession and they want the society at large to make a request if in case it is needed and only they can produce it on demand. Hence, no duplication. But, in the underlying scenario, we have the habit of storing important data on the cloud for ease of availability which is increasing the ease of access to every other being other than the owner too. Thus increasing the risk of protection. To mitigate the same, we need not roll back but instead, we need to inculcate the qualities shown by our previous generations into the machines through technology and to ourselves too.
This is where OneID comes into the picture by giving the complete rights of limited sharing to the owner and getting it authenticated by the trusted party time and again before using the identity. Identity impersonification hasn’t stopped with people alone in this world of IoT. Even non-living beings, tangible & intangible are also prone to losing their identity. Human intelligence has created an unbelievable number of duplications to various intangible assets on the globe viz., geographical boundaries, true names, history attached, owners, transfer of ownership, etc., With OneID fully enforced, even this shall get reduced to near zero as all the connected people mentioned above shall become the trusted parties in authenticating the asset removing the lacunas if any.
OneID wants to give back the rights of ownership back to the identity holder in full with no compromise in the benefits. Her ID is hers, His ID is his, Your ID is yours. So, why entrust the duty to someone else. Finally, OneID wants to enlighten society to entrust emphasis and enable the safety of one’s identity with one’s own self and none else. OneID shall only build and maintain the framework/platform.
For more information check here – OneID.network