Could blockchain hold the key to secure personal identities?

The technology that underpins Bitcoin could be used to create a single life log in the future

identity head digital

Blockchain and dynamic biometrics could be the future of identity management, providing a common standard is reached, a security expert believes.

Speaking on the use of blockchain technology for identity management, John Erik Setsaas, senior development architect at identity and digital signature firm Signicat, told delegates at Trust in the Digital World conference in The Hague that the technology presented the possibility for a single, secure, lifelong identity profile.

"Typically when you go into a discussion around blockchain, people start messing round with Bitcoin and blockchain as if it's the same thing ... Bitcoin is one usage of the blockchain, it's one application ... [it] is a generic technology that can be used for a lot of things," said Setsaas.

"We tend to talk about it in the singular, like there is only one blockchain ... But it's the technology, it's database technology, it's a way of organising your data. Anybody could set up that way of organising your data."

Advertisement
Advertisement - Article continues below

Setsaas said that the technology, which is used currently for cryptocurrencies like Bitcoin and Dogecoin primarily, could in fact have many applications that have not yet been considered.

One of the more radical of these is assigning a blockchain record to each child, worldwide, when it is born that is then updated with life events such as their date of marriage, when the child graduated, as well as financial aspects such as when a loan or mortgage was taken out and when it was repaid.

"These are events that, like an audit, could be added to your record on the blockchain ... this will then prove you as a person," Setsaas said.

This blockchain identity could then be used in scenarios such as opening bank accounts, securing tenancy or proving right to abode or employment.

To add an additional layer of security and ensure that data being fed into the record was coming from the real source, Setsaas suggested that dynamic biometrics - i.e. a pulse or gait analysis, rather than something static like a fingerprint or face scan - could be tied into the same record. This way, those businesses or organisations the person was interacting with could also guarantee they were dealing with the right person.

As for privacy concerns, Setsaas said: "I don't want all this information put on there available to everybody, obviously. We have data protection regulation, but also it's obvious we don't want all that information out there."

"One thought around that is the LMP, the life management platform, where ... you as the user are in charge of that information," Setsaas continued. "In the LMP, it's like a secure vault ... access to the vault is through the dynamic biometrics and I, as a user, decide what information I want to share. Maybe the only thing I need to prove is my age if I want to order liquor. If I want to take a loan, obviously I need to provide information like income and in different cases I need to provide different information, nobody needs to know all my information."

However, there are still challenges to overcome. The blockchain, by its nature, is unalterable, so if there was an erroneous entry on the record then it could never be deleted, only updated. Similarly, should someone be granted lifelong anonymity by the courts it would be difficult to create a new identity for them, as the blockchain by its nature is difficult to forge.

Questions also remain about how such a technology would treat transgendered people or deal with the right to be forgotten, as past entries cannot be deleted or altered.

There are other less blue-sky, but also less controversial, applications of blockchain technology too. "One very good use case for blockchain is an audit log - an audit log should never be changed," Setsaas said. "You have all the records and you cannot go back and forge the previous record."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/business/business-strategy/354252/huawei-takes-the-us-trade-sanctions-into-its-own-hands
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019