Identi3

Dock
Identi3
Senaste avsnittet

62 avsnitt

  • Identi3

    The Future of Caller Authentication: GSMA and Telefónica Reveal the Trusted Caller Identity Pilot

    2026-1-19 | 56 min.
    To explore what a better model could look like, Dock Labs hosted a live webinar on the future of caller authentication, presenting a joint proof of concept developed with GSMA Telefónica Tech and TMT ID. The session demonstrated how callers can authenticate themselves in seconds using a secure digital identity wallet, without sharing sensitive personal data and without relying on knowledge-based authentication or one-time passwords.
    The discussion examined the growing fraud landscape, the role of mobile operators as a new root of trust through SIM-based identity, and how decentralized identity and verifiable credentials can transform call center security while improving customer experience and privacy.
    The session featured Glyn Povah, Global Head of Product Development at Telefónica Tech, and Hélène Vigue, Identity and Data Director at GSMA, who shared insights from the pilot and outlined how the mobile industry is working together to restore trust in voice communications.
    (0:00) — Introduction
    (1:00) — The problem with today’s call center authentication
    (5:00) — Strategic context: rising fraud and erosion of trust in voice and messaging
    (8:44) — Call center impact: millions of callers spending minutes just to authenticate
    (9:20) — The three goals of the proof of concept: faster, stronger, more private authentication
    (10:16) — Global fraud landscape: $1 trillion in losses and rising impersonation scams
    (13:38) — Why the voice channel needs next-generation authentication
    (14:50) — Live demo begins: caller navigates IVR
    (16:21) — Why the demo is a major UX improvement over KBA and SMS OTP
    (17:13) — How the mobile operator issues the identity credential to the wallet
    (18:09) — Decentralized identity explained
    (22:26) — Why the flow feels familiar (similar to open banking approvals)
    (23:08) — Open standards: DIDComm, encrypted messaging, verifiable credentials
    (24:47) — Success metrics for the pilot explained25:13 — Integrating telco APIs, decentralized identity, and a call center platform
    (26:28) — Business KPIs: handle time, fraud reduction, customer experience
    (27:46) — Early user feedback and privacy benefits
    (30:08) — Observations from real call center operations
    (31:22) — Cost per minute of call center time and ROI opportunity
    (32:00) — Why the technology integration was easier than expected
    (34:40) — How this model reduces impersonation fraud
    (36:04) — SIM card as a new root of trust for identity
    (39:38) — How carrier network APIs secure credential issuance
    (44:40) — GSMA’s role in scaling industry-wide solutions
    (47:37) — Audience Q&A begins
    📚 EXPLORE:
    Website - https://www.dock.io/
    👨‍👩‍👧‍👧 FOLLOW:
    LinkedIn - https://www.linkedin.com/company/docknetwork/
  • Identi3

    EU Business Wallet: What You Need to Know About the EU’s Digital ID for Companies [Live Event]

    2025-12-22 | 58 min.
    We hosted a deep-dive session with two people directly involved in shaping and implementing the EU Business Wallet initiative: Viky Manaila, Trust Services Director at Intesi Group, and Rob Brand, Senior Policy Officer at the Netherlands Ministry of Economic Affairs and Co-Coordinator of the WE BUILD Consortium.
    The session explored what the EU Business Wallet is designed to do, why it matters for businesses of all sizes, and how it builds on eIDAS 2 and the European Digital Identity framework. We covered the regulatory proposal itself, the role of trust service providers, mandatory public-sector acceptance, and the real-world use cases being tested today through large-scale pilots.
    (00:00) Introduction
    (03:05) EU Business Wallet proposal overview
    (04:29) Key highlights of the EU Business Wallet
    (05:33) Core functionalities of the EU Business Wallet
    (07:27) Technical features and interoperability
    (08:44) Secure communication channel (QERDS)
    (09:46) European Digital Directory
    (10:35) Who can provide EU Business Wallets
    (12:19) Obligations of wallet providers
    (13:59) Supervision and oversight
    (15:25) Notification and approval process for providers
    (18:08) Legal effects and public sector obligations
    (19:19) WE BUILD Consortium overview
    (21:00) Supply chain and payments domains
    (23:09) Regulation timeline and implementing acts
    (26:59) Problems the Business Wallet solves
    (30:06) Cross-border interoperability and EU-wide impact
    (32:50) Most impactful early use cases
    (36:48) Industries that benefit most
    (38:39) Role of pilots and market readiness
    (40:18) Differences between large and small companies
    (43:26) Biggest hurdles to adoption
    (47:34) Five-year vision for the EU Business Wallet
    (49:32) Non-EU companies and Business Wallets
    (50:45) Trust list for Business Wallet providers
    (51:17) Business identifiers and registration numbers
    (53:26) Delegated authority and representation
    📚 EXPLORE:
    Website - https://www.dock.io/
    👨‍👩‍👧‍👧 FOLLOW:
    LinkedIn - https://www.linkedin.com/company/docknetwork/
  • Identi3

    EUDI in Practice: Inside Germany’s Digital Identity Strategy [Live Event]

    2025-12-15 | 1 h 9 min.
    In a recent webinar, we spoke with Mirko Mollik, Identity Architect at SPRIND (Germany’s Federal Agency for Breakthrough Innovation), to unpack how Germany is approaching the rollout of the EUDI ecosystem. The conversation went beyond high-level regulation and focused on the realities of implementation: how wallets will be certified, how issuers and verifiers will onboard, how privacy is enforced in practice, and which standards are truly mandatory.
    (00:00) – Introduction
    (02:15) – SPRIND’s role in building Germany’s European Digital Identity ecosystem.
    (04:37) – Why Germany is contributing directly to standards and allowing multiple wallets.
    (09:24) – Key lessons from the EUDI Large-Scale Pilots and interoperability challenges.
    (11:52) – What organizations should do now that the pilots are ending.
    (16:10) – What a PID is and why it’s the most valuable credential.
    (18:02) – Qualified vs non-qualified credentials and issuer liability.
    (24:52) – How GDPR shapes identity requests, pseudonyms, and user consent.
    (25:21) – Why verifier registration exists and how transparency is enforced.
    (27:58) – Why credential exchange is peer-to-peer and privacy-preserving.
    (31:52) – Germany’s EUDI sandbox, who can access it, and the rollout timeline.
    (33:28) – How cross-border verification works with national registries.
    (35:00) – Trust lists, X.509 certificates, and EU-wide verification.
    (45:18) – Rulebooks and how credential trust is defined in practice.
    (49:09) – Age verification without range proofs and cryptographic agility.
    (57:41) – How big tech wallets may participate in the EUDI ecosystem.
    (1:03:04) – Why DIDs and DIDComm are not mandated in the EUDI baseline.
    (1:08:07) – Closing thoughts on EUDI’s impact on digital identity in Europe.
    📚 EXPLORE:
    Dock Labs - https://www.dock.io/SPRIND - https://sprind.org
    👨‍👩‍👧‍👧 FOLLOW:
    LinkedIn - https://www.linkedin.com/company/docknetwork/
  • Identi3

    EUDI: Key Takeaways From Europe's Largest Digital ID Pilot [Live Event]

    2025-11-17 | 1 h 2 min.
    The European Digital Identity Wallet is entering one of the most consequential phases of its rollout, and few people are closer to the work than Esther Makaay, VP of Digital Identity at Signicat. After spending the last three years at the center of the European Identity Wallet Consortium (EWC), Esther joined us for a deep-dive presentation on what the Large-Scale Pilots have actually delivered, and how ready Europe truly is for the 2026 deadline.
    (00:00) – Intro
    (02:50) – Esther explains what the EUDI Wallet is
    (05:14) – Key timelines from 2024 to 2027
    (06:40) – Overview of the first round of Large-Scale Pilots
    (09:58) – Why payments are critical for wallet adoption
    (12:00) – Deep dive into payment authentication and initiation
    (18:55) – Travel pilots: airlines, ferries, biometrics, venues
    (24:45) – Why organizational identity is a major opportunity
    (27:45) – Business wallet pilots and key outcomes
    (29:35) – Interoperability results and remaining gaps
    (31:20) – How digital signing works with EUDI Wallets
    (34:10) – Trust infrastructure limitations and risks
    (38:50) – Business model challenges and missing incentives
    (42:20) – Adoption research and the 29% baseline
    (44:50) – New LSPs: WE BUILD and Aptitude
    (46:15) – One year to go: what still isn’t ready
    (55:00) – Q1: How eReceipts were piloted
    (56:40) – Q2: Collaboration with Apple and Google
    (58:10) – Q3: AI agents and delegated authority
    📚 EXPLORE:
    Website - https://www.dock.io/
    👨‍👩‍👧‍👧 FOLLOW:
    LinkedIn - https://www.linkedin.com/company/docknetwork/
  • Identi3

    Introduction to Decentralized Identity [Live Workshop]

    2025-10-13 | 1 h
    In this live workshop, Agne Caunt (Product Owner, Dock Labs) and Richard Esplin (Head of Product, Dock Labs) guided learners through the foundations of decentralized identity: how digital identity models have evolved, the Trust Triangle that powers verifiable data exchange, and the technologies behind it: from verifiable credentials to DIDs, wallets, and biometric-bound credentials.
    (0:00) – Welcome and session overview
    (2:50) – How digital identity models evolved
    (7:00) – Key benefits of decentralization
    (9:35) – From organization-centric to user-centric identity
    (12:15) – Understanding the Trust Triangle
    (14:30) – Example of Dock Labs’ verifiable credential platform
    (19:00) – What can be a verifiable credential
    (21:55) – Credential issuance and wallet flow.
    (23:15) – Inside the verifiable credential data model
    (24:50) – Selective disclosure and zero-knowledge proofs
    (27:20) – What are decentralized identifiers (DIDs)
    (30:10) – Choosing the right DID method
    (31:20) – What is a credential wallet
    (38:40) – Common misconceptions about wallets
    (40:20) – How biometric-bound credentials work
    (42:20) – The blockchain’s role in decentralized identity
    (46:15) – Practical exercise: map your trust triangle
    (47:10) – Q&A
    📚 EXPLORE:
    Website - https://www.dock.io/
    👨‍👩‍👧‍👧 FOLLOW:
    LinkedIn - https://www.linkedin.com/company/docknetwork/

Fler podcasts i Teknologi

Om Identi3

Identi3 is all about Digital Identity. In each episode, we'll bring you insights from experts at the forefront of the Digital ID space. Hosted by Nick Lambert, Dock's CEO.
Podcast-webbplats

Lyssna på Identi3, Better Offline och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner

Identi3: Poddsändningar i Familj

Sociala nätverk
v8.3.1 | © 2007-2026 radio.de GmbH
Generated: 1/30/2026 - 7:22:47 PM