TY - JOUR T1 - A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada’s Public and Private Sectors JF - Technology Innovation Management Review Y1 - 2017 A1 - Greg Wolfond KW - blockchain KW - consumer privacy KW - cybersecurity KW - digital assets KW - digital attributes KW - digital identity KW - identity fraud KW - identity verification KW - online privacy KW - online security AB - Blockchain-based solutions have the potential to make government operations more efficient and improve the delivery of services in the public and private sectors. Identity verification and authentication technologies, as one of the applications of blockchain-based solutions – and the focus of our own efforts at SecureKey Technologies – have been critical components in service delivery in both sectors due to their power to increase trust between citizens and the services they access. To convert trust into solid value added, identities must be validated through highly-reliable technologies, such as blockchain, that have the capacity to reduce cost and fraud and to simplify the experience for customers while also keeping out the bad actors. With identities migrating to digital platforms, organizations and citizens need to be able to transact with reduced friction even as more counter-bound services move to online delivery. In this article, drawing on our own experiences with an ecosystem approach to digital identity, we describe the potential value of using blockchain technology to address the present and future challenges of identity verification and authentication within a Canadian context. PB - Talent First Network CY - Ottawa VL - 7 UR - http://timreview.ca/article/1112 IS - 10 U1 - SecureKey Technologies Greg Wolfond is the Founder of SecureKey Technologies and brings more than 30 years of experience in fintech, security, and mobile solutions to his role as Chief Executive Officer. Greg is a serial entrepreneur whose earlier ventures include Footprint Software Inc., a financial software company he sold to IBM, and 724 Solutions Inc., a wireless infrastructure software provider he took public. He sits on several boards and has been recognized as one of Canada’s Top 40 Under 40, Entrepreneur of the Year, and one of the 100 Top Leaders in Identity. Greg holds a Bachelor of Arts in Computer Science from the University of Western Ontario, Canada, and a Bachelor of Science in Biochemistry and Life Sciences from the University of Toronto, Canada. ER - TY - JOUR T1 - Multifactor Authentication: Its Time Has Come JF - Technology Innovation Management Review Y1 - 2013 A1 - Jim Reno KW - authentication attacks KW - authentication mechanisms KW - multifactor authentication KW - online security AB - Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: “What you know”, “What you have”, and “What you are”. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience. PB - Talent First Network CY - Ottawa VL - 3 UR - http://timreview.ca/article/716 IS - 8 U1 - CA Technologies Jim Reno is a Distinguished Engineer and Chief Architect for Security at CA Technologies. He joined CA with the Arcot acquisition in October 2010. At Arcot, Jim led the development of strong authentication and risk management systems. He has more than 30 years’ experience in software development, working on operating systems, databases, networking, systems management, and security. Jim is one of the inventors of the 3-D Secure protocol used in the Verified by Visa and MasterCard SecureCode programs. He holds multiple patents in the area of credit card verification and authentication. At CA he guides the overall architecture of CA’s security products as well as security aspects of the entire CA portfolio. ER -