SEAL Project: Enhancing Identity Management and KYC Solutions

Slide Note
Embed
Share

The SEAL project aims to provide a robust infrastructure for identity management and KYC processes, emphasizing user data control and decentralized storage to minimize risks. Using a combination of federated and self-sovereign approach, SEAL offers microservice-based architecture supporting web and mobile clients, ensuring secure storage and data handling while enabling trusted identity linking and data sharing among different modules. Service users can manage persistence storage, retrieve identity data, establish trusted links, generate verifiable claims, and allow data consumption by requesting service providers using various authentication and storage modules.


Uploaded on Sep 30, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. SEAL Project StudEnt And citizen identities Linked SEAL SERVICE: Linked identity solutions & architecture SEAL Webinar (April 3rd2020) GRANT AGREEMENT UNDER THE CONNECTING EUROPE FACILITY (CEF) - TELECOMMUNICATIONS SECTOR AGREEMENT INEA/CEF/ICT/A2018/1633170. Action No: 2018-EU-IA-0024 GRANT AGREEMENT UNDER THE CONNECTING EUROPE FACILITY (CEF) - TELECOMMUNICATIONS SECTOR AGREEMENT INEA/CEF/ICT/A2018/1633170. Action No: 2018-EU-IA-0024 www.project-seal.eu

  2. Design Goals Functional: Offer a reference infrastructure for the management of identities and KYC Allow connecting new identities, service modules, KYC methods, etc. Minimise risk on data by avoiding central storage User always has control of his own data Enforce establishing progressively stronger links between identities Form a virtually single identity Technical: Support both federated and self-sovereign approach to data gathering and delivery Develop a modular, extensible, scalable application

  3. High-level Topology

  4. Service Characteristics SEAL service design: Microservice-based architecture Two main clients: web and mobile, connect to the service through API Most of the functionality will be server-side. Clients have minimal logic Mobile client has some more functionalities than web client User data is stored on user-space storage Data is stored only when (and if) user commands to (usage can be volatile and anonymous) No storage of personal data, not even on reconciliation modules Ciphered sessions A user can access different instances of SEAL carrying his own data with him Different instances can have different functional modules connected (identities, identity linking procedures, etc.)

  5. Use Cases SEAL Service allows the user to: Set-up or load a persistence storage Retrieve identity data from a source Store the retrieved data on a persistence store Request establishing a trusted link between two retrieved data sets Move data between persistence storages Generate derived identifiers Generate a Verifiable Claim from the data in storage and store it on a wallet Allow a requesting SP to consume data from the sources or the storage One of the sources is a SSI VC validator

  6. Characteristics Authentication/Data sources: eIDAS, EduGAIN, Machine-readable travel documents, SSI Wallet Link modules: Automated linking, Remote officer validation Service modules: SAML2, OIDC, UPort VC issuer Storage modules: Cloud Storage, mobile storage, local file storage, browser storage Derivation modules: Random UUID module

  7. Modular Design

  8. Storage Encrypted by the user with a password Signed by the SEAL service Loaded into the user session, to be modified and edited. Includes Datasets: Each dataset includes a set of attributes obtained from a single source Each dataset has its own LoA based on the quality of the source Sources can be: remote identity/auth sources linking modules Id derivation modules When an storage is loaded, any datastore in session is overridden

  9. Automated Linking Establish a similarity index between two datasets From comparing its attributes Attributes are paired and transformed according to a specific rule set If index is above a threshold, link is issued Level of assurance is low-med (currently low, due to reduced attribute sets)

  10. Linking Level of Assurance Imported datasets have a LoA, link datasets have a LLoA 5 Levels, depending on: Chances of a false positive (sets are identifying enough?) Quality of the matching (automated or manual?, in-person or remote?, who does it, trust, skills ) Primitive or Inferred LLoA? [eIDAS Facebook LLoA: 100% or 0%?] Primitive: don t consider the LoA of the compared datasets Inferred: consider the LoA of the compared datasets Final trust must depend on the quality of the compared data sets (their LoA) and on the quality of the linking method (LLoA) Transitive property: If we have an AB link and a BC link, we have an AC link Resulting trust is the minimum value in the chain

  11. Future Work Improve linking: Develop more matching rules for the known attribute profiles Implement a block-edit hybrid string similarity algorithm Trust and scalability: Revocation of Datasets, Datastores and VCs UI for revocation for the user API to allow the data source to revoke If sources are able to revoke, dataset in the store can be used for auth with longer validity periods Multiple SEAL instances: Any instance can sign a Datastore, the rest must accept it Create ring of trust of SEAL instances

  12. THANK YOU for your attention farago@uji.es http://project-seal.eu/ GRANT AGREEMENT UNDER THE CONNECTING EUROPE FACILITY (CEF) - TELECOMMUNICATIONS SECTOR AGREEMENT INEA/CEF/ICT/A2018/1633170. Action No: 2018-EU-IA-0024 GRANT AGREEMENT UNDER THE CONNECTING EUROPE FACILITY (CEF) - TELECOMMUNICATIONS SECTOR AGREEMENT INEA/CEF/ICT/A2018/1633170. Action No: 2018-EU-IA-0024 www.seal.org

Related


More Related Content