Identity Authentication from a Web 2.0 Database to a Web 3.0 Blockchain

Must Read

Two Arrested in Investigations with Cryptovaultua for Money Laundering

The Fiscal Information and Investigation Service has arrested two men in suspicion of money laundering with cryptocurrency. The...

Ripple Partner Ria Money Transfers Joins Forces With Austrian Post for Remittance Service

Euronet Worldwide connected with Ripple and integrated the Ripple cryptocurrency. Ria Money Transfer is a subsidiary of Euronet...

Telegram-SEC Hearing: SEC is in Disarray, Judgement to be passed before April 4

Telegram's initial coin offering is claimed to be offered to private investors who have no interest in cryptocurrency. ...
5d85c99dd353c-bpfull
Steve Anderrson
Steve Anderson is an Australian crypto enthusiast. He is a specialist in management and trading for over 5 years. Steve has worked as a crypto trader, he loves learning about decentralisation, understanding the true potential of the blockchain. Join the official channel of thecoinrepublic, For the latest news updates: https://t.me/thecoinrepublic
Survey On Blockchain Reveals How Majority Of Population Is Unknown To The Technology
  • Identity authentication in web 2.0 is the process by which the authenticated object proves its identity by showing the identity key.
  • A DID record contains a ton of data, including DID number, comparing character name, and public key, associating identity key.
  • Students who don’t seem to be conversant in DID could also be surprised that the DID number is simply random.

While you are out in the physical world, there is no authentication required for your identity. If someone knows you, they would also know your identity. You won’t have to sit and give proofs regarding who you are.

However, that is not the case in the digital world. While logging into a website, one usually logs in with a username and password. This is for a person’s safety and privacy. 

A person can be a citizen, a driver, a user of a video site, a husband, a son, and various other things. With an identity document model, one can easily understand identity authentication in a variety of scenarios, and this can also be carried out in a unified way.

Web 2.0: Identity Authentication

An identity document contains two data stored in a trusted medium. These two data are the identity name and the identity key. Identity authentication in web 2.0 is the process by which the authenticated object proves its identity by showing the identity key.

Traditionally, identity authentication indicates to confirming the binding relationship between physical identity and a social role. But the abstract model is additionally applicable to the case where the thing being authenticated is an individual apart from someone, like an internet site, a device, or a robot.

The identity document-reading model adequately explains the present process of logging in to an official website to implement identity authentication.

The person to be authenticated is the App, and therefore the object to be verified is the user. The explanation of why passwords are difficult to forge isn’t because they’re complicated, but because others don’t know them. 

The decentralized autonomous identity authentication process

The premise of DID activity is the DID report, which is put away on the blockchain. The blockchain is a perpetual storage medium trusted by individuals around the globe.

A DID record contains a ton of data, including DID number, comparing character name, and public key, associating identity key.

The basis of DID operation is the DID document, which is stored on the blockchain. The blockchain is an immutable storage medium trusted by people around the world.

A DID file contains a lot of information, including DID number, corresponding identity name, and public key, corresponding identity key. 

There are various other characteristics of DID-based authentication. Firstly, the identity key in the DID document is public. Further, during the authentication process, the person being authenticated does not hold the identity key stored in the document. The idea of DID about ​​cryptography-based authentication is not a new creation. 

Authentication and authorization are inseparable. Students who don’t seem to be conversant in DID could also be surprised that the DID number is simply random. Since most of the time, identity and power are tied. It also can be stated that identity is defined by power and obligation. 

Lastly, combining the assorted discussions, one discovers that regardless of whether it’s digital space or physical space, whether it’s centralized or decentralized, identity is often abstracted into an identity stored on a trusted medium. The documents are the ones that incorporate the identity name and identity key. 

Hot News

Two Arrested in Investigations with Cryptovaultua for Money Laundering

The Fiscal Information and Investigation Service has arrested two men in suspicion of money laundering with cryptocurrency. The investigations led by the Functional...

Ripple Partner Ria Money Transfers Joins Forces With Austrian Post for Remittance Service

Euronet Worldwide connected with Ripple and integrated the Ripple cryptocurrency. Ria Money Transfer is a subsidiary of Euronet Worldwide. The partnership will be...

Telegram-SEC Hearing: SEC is in Disarray, Judgement to be passed before April 4

Telegram's initial coin offering is claimed to be offered to private investors who have no interest in cryptocurrency. The judge pointed out the...

Finland Bank Head Talks About Central Banks Plan To Introduce CDBC

Head of Digitalisation at Bank of Finland,  made a Linkedin post talking about the central bank digital currency. Aleksi Grym mentions, only a...

CME Group has on it’s Largest Bitcoin Futures Contract Volume Days

The Chicago based commodities exchange that handles the market’s most actively traded Bitcoin futures contract, CME group, saw it’s trading volume suddenly shoot up. The...

Jack Chervinsky Believes That The Wilshire Phoenix Bitcoin ETF Will Be Denied Approval By The SEC

The Securities and Exchange Commission is going to announce its decision on the 26th of February. Jack Chervinsky, a famous cryptoanalyst from...

Ripple Partner Ria Money Transfers Joins Forces With Austrian Post for Remittance Service

Euronet Worldwide connected with Ripple and integrated the Ripple cryptocurrency. Ria Money Transfer is a subsidiary of Euronet Worldwide. The partnership will be...

Telegram-SEC Hearing: SEC is in Disarray, Judgement to be passed before April 4

Telegram's initial coin offering is claimed to be offered to private investors who have no interest in cryptocurrency. The judge pointed out the...

Finland Bank Head Talks About Central Banks Plan To Introduce CDBC

Head of Digitalisation at Bank of Finland,  made a Linkedin post talking about the central bank digital currency. Aleksi Grym mentions, only a...

CME Group has on it’s Largest Bitcoin Futures Contract Volume Days

The Chicago based commodities exchange that handles the market’s most actively traded Bitcoin futures contract, CME group, saw it’s trading volume suddenly shoot up. The...

RELATED NEWS

Two Arrested in Investigations with Cryptovaultua for Money Laundering

The Fiscal Information and Investigation Service has arrested two men in suspicion of...

Ripple Partner Ria Money Transfers Joins Forces With Austrian...

Euronet Worldwide connected with Ripple and integrated the Ripple cryptocurrency. Ria Money Transfer...

Telegram-SEC Hearing: SEC is in Disarray, Judgement to be...

Telegram's initial coin offering is claimed to be offered to private investors who...