Fujitsu offers a digital identity management service, tamper-proof and secure, to assess the reliability of its interlocutor. It will be accessible via the Cloud.
For Fujitsu, the fight against fraud and data tampering during an online transaction requires the creation of a tamper-proof digital identity through Blockchain technology.
The Japanese firm presented a solution that allows to confirm the identity of the other party, but also to assess its reliability.
To do this, the use of more user-friendly graphics makes it possible to visualize the relations between the parties, as well as to display a trust score linked to reputation and previous evaluation.
Fujitsu’s decentralized identification system thus converts data from both parties’ old transactions on the blockchain into a graphical structure.
A trust score is attached to each user based on factors including in particular the number of trusted users who evaluate them.
“Even if a user collaborates with a third party to increase their rating, relationships structured in the form of graphs will reveal information such as their weak relationships with other users, thus giving the system the potential to identify false statements.” Explain Fujitsu.
Fujitsu intends to implement this technology in fiscal 2019 as a new feature of its Fujitsu Virtuora DX Cloud Service, a cloud-based service for the use of data based on blockchain technology.
The issue of digital identity management via blockchain is being addressed by major IT players. Last February, Microsoft unveiled its projects in the field.
The Redmond group ensures ” have invested, over the past 12 months, a set of ideas for using Blockchain (and other distributed technologies) to create new types of digital identities, identities designed to improve privacy, security and control “.
Microsoft intends to use distributed blockchain technologies to securely store and manage digital identities. Initially, it will take charge of the identifiers thus decentralized (DID for “decentralized identities”) via its Microsoft Authentificator application.
The primary advantage of such an approach is obvious in view of the potential of the blockchain: the development of a decentralized identity system. Unlike the identification tools currently used in the world.
Microsoft considers that with the existing model, Internet users have no control over their identity data and are exposed to data exploitation violations and the risk of identity theft.