The Fight For Your Information
Cryptography and Digital Identification
In an effort to make the application of blockchain technology more palatable for everyday consumers, Jacob Keteyian – a master’s candidate in Health Management at Harvard – details how this digital identification protocol works and discusses realistic use cases for consumers and business owners alike.
{shortcode-39e86324d16d201608ab445d59a8c3aa50408045}
This post has been paid for in order to allow third-party generated content to be published. It has been written for educational purposes.
The blockchain community is constantly looking for practical use cases. One of the latest practical use cases of DigiByte technology is Digi-ID. Digi-ID is an, “open source, community driven, authentication project based on the DigiByte Blockchain,” according to their website. This application can effectively eliminate credentialed access to nearly every platform that stores a user’s username and password. This technology offers a fast and secure way to log-in to websites, buildings, and software applications. Listed below are the details of the technology and a couple of specific use cases that are applicable across industries.
How Does the Open Authentication Protocol Work?
Each time a user visits a website, one can simply scan the QR code generated by Digi-ID. If one is using their cellphone, they just click the QR code and the DigiByte app will open to sign you in. Absolutely no personally identifiable information is part of the Digi-ID process.
{shortcode-2b20ac78eddc6ccca76b63794d5e253729acc742}
Digi-ID QR codes do not include any previous passwords or usernames and cannot be linked to your information: the QR only holds where to send the login information to. The authenticator interfaces with the specific website or service the user is using and passes minimal data to complete the action. Nothing aside from your public address is transmitted and the back-end login is executed via cryptography and random strings of letters and numbers.
There are startup companies built on comparable technologies, and DigiByte is giving it away for free to business owners and consumers.
{shortcode-5f73486bf48b4bc3419ba6bb8da9be2953f1b3ff}
Consumer Use Case: Software Access and Password Security
There have been a number of massive hacks in the last few years exposing personally identifiable information and login credentials. For example, more than 100 million Equifax accounts and an additional 100 million encrypted emails and passwords were exposed by a large genetic testing company in the last decade alone. Most recently, Facebook discovered a security issue that compromised information in approximately 50 million accounts. Although it cannot totally mitigate susceptibility to these hacks, a second layer security mechanism can certainly help protect your information.
If you recycle your old passwords, you might be leaving yourself more vulnerable to hacks. In fact, doing this reduces your level of security to the least secure system you use your password on. Instead of having to put usernames and passwords in the hands of another centralized service or remember a log-in for each service, this technology affords the user the luxury of a cryptographic second layer security mechanism.
{shortcode-09c7b0f97706c4e12fe88c292446d916ab5c5833}
Short-Term and Stretch Use Cases: Physical Access and Identification Verification
A short-term use case for the technology is for Digi-ID to be used for credentialed access to specific buildings. Health systems, clinics, and labs that require specific secure access could take advantage of the technology almost immediately. “Personal and corporate cellphones can both use Digi-ID for credentialed access to buildings. There is no way to fake or forge a Digi-ID identity!” says Noah Seidman, one of the lead engineers for DigiByte’s development team. Seidman has been critical to the development process for Digi-ID is excited about real world implementation of the technology.
{shortcode-37a0a978a605d89e957bde59ee57118fe6e8e19b}
Digi-ID is consistent with FIDO specifications and could integrate with Bluetooth security keys to provide an open source alternative to mainstream security solutions. Seidman notes that, “Companies can use Digi-ID to build royalty free competition to some of the world’s largest security companies, such as Symantec and their multifactor authentication product, VIP access.”
A “stretch” use case – but still certainly practical – might be this type of technology replacing social security. Seidman notes that, “Although there is tremendous complexity and logistical considerations, it is certainly feasible. Each individual’s public key would be their identity. A citizen could prove their identity by signing messages with their corresponding private key.”
{shortcode-c3826bff25c15eded9daa1e2ed140ab06d645ef9}
Seidman continues, “There would be no way to fake or forge public and private key pairs – this would be incredibly more secure than the status quo.”
Business Owner Use Case: Integration with Your Business
Website owners and SaaS (Software as a Service) providers will need to implement the technology. Integration with your business will depend on what your product was built with. There are multiple common ecommerce plugins available, if your business’s plugin is already developed you can be using Digi-ID in a few minutes.
{shortcode-a768c30115619a0104431fcb18c8487b8a0d13ed}
It is important to note that Digi-ID can also be used in conjunction with traditional authentication methods. For example, if a business owner does not want to use 2FA (“2 Factor Authentication”) or SMS authentication as an additional security layer, Digi-ID can be offered side-by-side with a username & password authentication method.
{shortcode-62d9a60f315f5651659eb06d6f6dcab537f3ac9c}
The Final Word
The next practical, and exciting, use case of blockchain technology is Digi-ID. The underlying technology was created by Jared Tate, who recently sat down on CNBC CryptoTrader to discuss some of the exciting things going on in the DigiByte community. Tate is supported by a strong development team that is pushing the boundaries of the technology and finding practical use cases with a positive impact. If you are a vendor looking to add additional security to your service’s authentication mechanism or you are looking to eliminate the multiple usernames and passwords in your life, this digital authentication protocol is available to assist.
Jacob A. Keteyian is a master’s candidate in Health Management at Harvard
Those interested in development or learning more can connect with the DigiByte team by visiting their website or reaching out directly to ammar@digibyte.io.
__________________________________________________
The information provided in this educational series is intended to enable developers and investors to understand the nature of DigiByte’s technology. This article is not intended as and does not constitute investment advice of any kind. The views expressed in this article are solely that of the author, and does not represent that of The Harvard Crimson. Keteyian encourages you to conduct thorough research before investing in any cryptocurrency and he is not being compensated by any party for this educational series.
The Crimson's news and opinion teams—including writers, editors, photographers, and designers—were not involved in the production of this article.