{"id":69163,"date":"2020-10-22T08:00:00","date_gmt":"2020-10-22T06:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=69163"},"modified":"2020-09-30T15:05:29","modified_gmt":"2020-09-30T13:05:29","slug":"la-blockchain-pour-une-identite-numerique-securisee","status":"publish","type":"post","link":"https:\/\/e3mag.com\/fr\/la-blockchain-pour-une-identite-numerique-securisee\/","title":{"rendered":"Vers une identit\u00e9 num\u00e9rique s\u00e9curis\u00e9e gr\u00e2ce \u00e0 la blockchain"},"content":{"rendered":"<p>Qu'il s'agisse d'achats, d'entretiens de conseil avec la banque ou de contacts avec l'administration : la crise de la Corona a \u00e9galement entra\u00een\u00e9 le transfert d'un nombre croissant d'activit\u00e9s quotidiennes vers le monde num\u00e9rique. Dans ce contexte, une question occupe une place de plus en plus centrale : comment prouver num\u00e9riquement son identit\u00e9 ? Et ce, de mani\u00e8re rapide, confortable et s\u00fbre, de sorte que le moins d'informations possible soient enregistr\u00e9es \u00e0 des endroits sur lesquels l'individu n'a aucune influence et sans que des tiers ne le sachent, par exemple lorsque nous nous identifions aupr\u00e8s d'un organisme. <\/p>\n\n\n\n<p>La technologie blockchain et ce que l'on appelle la Self Sovereign Identity, \u00e9galement appel\u00e9e identit\u00e9 num\u00e9rique d\u00e9centralis\u00e9e, offrent une r\u00e9ponse possible \u00e0 ce d\u00e9fi. L'association num\u00e9rique Bitkom a donc publi\u00e9 \u00e0 ce sujet un document d'information intitul\u00e9 \"Self Sovereign Identity Use Cases - from the vision to the practice\", qui explique le concept et esquisse quatre cas d'application concrets dans lesquels la technologie est sup\u00e9rieure aux solutions traditionnelles.<\/p>\n\n\n\n<p>L'objectif principal des identit\u00e9s num\u00e9riques d\u00e9centralis\u00e9es est de permettre \u00e0 l'utilisateur de g\u00e9rer lui-m\u00eame son identit\u00e9 num\u00e9rique sans d\u00e9pendre d'un prestataire de services d'identit\u00e9 central o\u00f9 sont stock\u00e9es ses donn\u00e9es personnelles, par exemple. Au lieu de cela, l'utilisateur re\u00e7oit une seule fois, de la part d'organismes de confiance tels que les autorit\u00e9s publiques, des certificats num\u00e9riques relatifs \u00e0 certaines caract\u00e9ristiques personnelles d'identit\u00e9, telles que l'adresse ou l'\u00e2ge, qu'il peut ensuite utiliser pour s'identifier et s'authentifier sans autre consentement de l'\u00e9metteur. La blockchain est utilis\u00e9e pour garantir la l\u00e9gitimit\u00e9 des attestations num\u00e9riques d\u00e9livr\u00e9es qui, en tant que telles, ne permettent pas de remonter aux donn\u00e9es personnelles.<\/p>\n\n\n\n<p>Apr\u00e8s avoir introduit le fonctionnement, le document de Bitkom pr\u00e9sente quatre cas d'application des identit\u00e9s num\u00e9riques d\u00e9centralis\u00e9es. Ainsi, celles-ci peuvent \u00eatre utilis\u00e9es pour la gestion de l'acc\u00e8s \u00e0 des b\u00e2timents tout comme pour la d\u00e9livrance de certificats de formation et l'\u00e9change de donn\u00e9es de base.<\/p>","protected":false},"excerpt":{"rendered":"<p>L'association num\u00e9rique Bitkom publie le document d'information \"Self Sovereign Identity Use Cases - from the vision to the practice\".<\/p>","protected":false},"author":38,"featured_media":69164,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,38075],"tags":[35,886],"coauthors":[19920],"class_list":["post-69163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-2009","tag-bitkom","tag-blockchain","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2020\/09\/shutterstock_1110026705_bearbeitet-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Der Digitalverband Bitkom ver\u00f6ffentlicht das Infopapier \u201eSelf Sovereign Identity Use Cases \u2013 von der Vision in die Praxis\u201c.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/fr\/categorie\/sap-nouvelles\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/fr\/categorie\/mag-2009\/\" rel=\"category tag\">MAG 20-09<\/a>","author_info_v2":{"name":"Magazine E-3","url":"https:\/\/e3mag.com\/fr\/author\/e-3-magazin\/"},"comments_num_v2":"0 commentaire","_links":{"self":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/69163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/comments?post=69163"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/posts\/69163\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media\/69164"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/media?parent=69163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/categories?post=69163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/tags?post=69163"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/fr\/wp-json\/wp\/v2\/coauthors?post=69163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}