{"id":69163,"date":"2020-10-22T08:00:00","date_gmt":"2020-10-22T06:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=69163"},"modified":"2020-09-30T15:05:29","modified_gmt":"2020-09-30T13:05:29","slug":"with-blockchain-to-secure-digital-identity","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/with-blockchain-to-secure-digital-identity\/","title":{"rendered":"With blockchain to secure digital identity"},"content":{"rendered":"<p>Whether shopping, consulting with the bank, or contact with the administration: even as a result of the Corona crisis, more and more everyday activities have shifted to the digital world. One question is becoming increasingly important: How can you prove your identity digitally? And quickly, conveniently and securely, so that as little information as possible is stored in places over which the individual has no control, and without third parties finding out, for example, when we identify ourselves to a body. <\/p>\n\n\n\n<p>One possible answer to this challenge is offered by blockchain technology and the so-called Self Sovereign Identity, also known as decentralized digital identity. The digital association Bitkom has therefore published an information paper on this topic, \"Self Sovereign Identity Use Cases - from vision to practice,\" which explains the concept and outlines four concrete use cases in which the technology is superior to conventional solutions.<\/p><div id=\"great-4004245935\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>At its core, decentralized digital identities are about users managing their own digital identities without being dependent on a central identity service provider where, for example, their personal data is stored. Instead, the user receives one-time digital certificates from trusted entities such as government agencies about certain personal identity characteristics, such as address or age, which they can then use for identification and authentication without further consent from the issuer. The blockchain is used to guarantee the legitimacy of the digital certificates issued, which as such do not allow any inference to personal data.<\/p>\n\n\n\n<p>After introducing how they work, the Bitkom paper presents four use cases for decentralized digital identities. For example, they can be used for managing access to buildings as well as for issuing education certificates and exchanging master data.<\/p>","protected":false},"excerpt":{"rendered":"<p>The digital association Bitkom publishes the info paper \"Self Sovereign Identity Use Cases - from vision to practice\".<\/p>","protected":false},"author":38,"featured_media":69164,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,38075],"tags":[35,886],"coauthors":[19920],"class_list":["post-69163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-2009","tag-bitkom","tag-blockchain","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Der Digitalverband Bitkom ver\u00f6ffentlicht das Infopapier \u201eSelf Sovereign Identity Use Cases \u2013 von der Vision in die Praxis\u201c.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-2009\/\" rel=\"category tag\">MAG 20-09<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/69163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=69163"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/69163\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/69164"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=69163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=69163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=69163"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=69163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}