STIR/SHAKEN and CLI Spoofing Mitigation

STIR/SHAKEN is a framework of interconnected standards. STIR/SHAKEN are acronyms for the Secure Telephone Identity Revisited (STIR) and Signature-based Handling of Asserted Information Using toKENs (SHAKEN) standards. This means that calls traveling through interconnected phone networks would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. … Read more

Use CodeB SSI as OIDC Identity Provider for NextCloud

The Self-Sovereign Identity System of CodeB does not only support W3C DID’s but comes also with an inbuilt OpenID Connect (OIDC) Identity Provider. OpenID Connect meets distributed Self-Sovereign Identities. Integration of the Identity Provider into existing systems is extremely easy. In this article we use NextCloud as an example. To configure WordPress is explained HERE. … Read more

OpenID Connect meets distributed Self-Sovereign Identities

Self-Sovereign Identity (SSI) emerged with the rise of blockchain technology. This paradigm focuses on user-centricity and strives to place the user in full control of the digital identity. It is a concept in the digital movement that only the user should own their identity data fully without intervention from outside administration. By using a Self-Sovereign … Read more

Bearer Token Generation

A Bearer Token (RFC 6750) is a cryptic string, usually generated by the server in response to a login request. It contains a subject claim (sub) which references an authorized entity (i.e., the User, Application or Organization). The authorized entity uses a signed bearer authorization token to access one or more resources for which the … Read more

Capabilities Matrix

The Capabilities Matrix is made of Verifiable Claims with a special syntax for the “ClaimType“. When using a dot notation for the ClaimType number (like OIDs) a claim becomes an entry in the Capabilities Matrix. For example number 1.1, 1.4.5, 2.1343.1, etc. The Capabilities Matrix can also be used for Commercial Attributes. Up to 7 … Read more

Detect & Protect Against Wangiri Callback Fraud

Wangiri Callback Fraud is a widespread and diverse global challenge, damaging operator and service provider reputations and relationships with their subscribers. While fraudsters are well known for their malicious innovations, they are loyal to what works; once a scamming method proves to deliver dependable results, they relentlessly take advantage over the long term. One tried … Read more

Add key roles and permissions to Self-Sovereign Identity (SSI)

The creator of an identity contract holds per default full rights to his own identity. Additionally he can assign roles and rights to other keys and identities. For example to a backup key, a financial controller, the government to add verifiable claims, or a service like a SMS Hub to debit funds, etc. For example … Read more

Distributed IMEI Blacklisting

Small, portable and high value, mobile devices – and the information stored in them – are attractive to criminals. As high-end handsets can be worth hundreds of dollars,there is a major international black market for mobile devices obtained through theft, fuelled in part by organized crime. For the victim, the experience can be traumatic, as … Read more

Add Claim to Self-Sovereign Identity (SSI)

A claim is a qualification, achievement, quality, or piece of information about an entity’s background such as a name, government ID, payment provider, home address, or university degree. Such a claim describes a quality or qualities, property or properties of an entity which establish its existence and uniqueness. If a claim has been attested by … Read more

Encrypted Data Sharing

With the traditional RSA cryptography it is easy to share encrypted data between multiple parties. Mechanism known from RSA do not work like that if you have to work with elliptic curves in blockchain environments. For example in blockchain environments not the public key is known by the public public but the hash of the … Read more