Blockchain-Based Identity Authentication and Intelligent Credit Reporting
نویسندگان
چکیده
منابع مشابه
Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems
We devised a mobile biometric-based authentication system only relying on local processing. Our Android open source solution explores the capability of current smartphones to acquire, process and match fingerprints using only its built-in hardware. Our architecture is specifically designed to run completely locally and autonomously, not requiring any cloud service, server, or permissioned acces...
متن کاملBlockchain Based Intelligent Vehicle Data sharing Framework
The Intelligent vehicle (IV) is experiencing revolu tionary growth in research and industry, but it still suf fers from many security vulnerabilities. Traditional se curity methods are incapable to provide secure IV dat a sharing. The major issues in IV data sharing are trus t, data accuracy and reliability of data sharing data in the communication channel. Blockchain technology works for the c...
متن کاملEduCTX: A Blockchain-Based Higher Education Credit Platform
Blockchain technology enables the creation of a decentralized environment where transactions and data are not under the control of any third party organization. Any transaction ever completed is recorded in a public ledger in a verifiable and permanent way. Based on blockchain technology, we propose a global higher education credit platform, named EduCTX. This platform is based on the concept o...
متن کاملBlockchain based trust & authentication for decentralized sensor networks
Sensor networks and Wireless Sensor Networks (WSN) are key components for the development of the Internet of Things. These networks are subject of two kinds of constraints. Adaptability by the mean of mutability and evolutivity, and constrained node resources such as energy consumption, computational complexity or memory usage. In this context, none of the existing protocols and models allows r...
متن کاملCredit and Identity Theft
The quintessential crime of the information age is identity theft, the malicious use of personal identifying data. In this paper we model “identity” and its use in credit transactions. Various types of identity theft occur in equilibrium, including “new account fraud,” “existing account fraud,” and “friendly fraud.” The equilibrium incidence of identity theft represents a tradeoff between a des...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2020
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1437/1/012086