@article {1112, title = {A Blockchain Ecosystem for Digital Identity: Improving Service Delivery in Canada{\textquoteright}s Public and Private Sectors}, journal = {Technology Innovation Management Review}, volume = {7}, year = {2017}, month = {10/2017}, pages = {35-40}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Blockchain-based solutions have the potential to make government operations more efficient and improve the delivery of services in the public and private sectors. Identity verification and authentication technologies, as one of the applications of blockchain-based solutions {\textendash} and the focus of our own efforts at SecureKey Technologies {\textendash} have been critical components in service delivery in both sectors due to their power to increase trust between citizens and the services they access. To convert trust into solid value added, identities must be validated through highly-reliable technologies, such as blockchain, that have the capacity to reduce cost and fraud and to simplify the experience for customers while also keeping out the bad actors. With identities migrating to digital platforms, organizations and citizens need to be able to transact with reduced friction even as more counter-bound services move to online delivery. In this article, drawing on our own experiences with an ecosystem approach to digital identity, we describe the potential value of using blockchain technology to address the present and future challenges of identity verification and authentication within a Canadian context. }, keywords = {blockchain, consumer privacy, cybersecurity, digital assets, digital attributes, digital identity, identity fraud, identity verification, online privacy, online security}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/1112}, url = {http://timreview.ca/article/1112}, author = {Greg Wolfond} } @article {716, title = {Multifactor Authentication: Its Time Has Come}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {08/2013}, pages = {51-58}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Transactions of any value must be authenticated to help prevent online crime. Even seemingly innocent interactions, such as social media postings, can have serious consequences if used fraudulently. A key problem in modern online interactions is establishing the identity of the user without alienating the user. Historically, almost all online authentications have been implemented using simple passwords, but increasingly these methods are under attack. Multifactor authentication requires the presentation of two or more of the three authentication factor types: {\textquotedblleft}What you know{\textquotedblright}, {\textquotedblleft}What you have{\textquotedblright}, and {\textquotedblleft}What you are{\textquotedblright}. After presentation, each factor must be validated by the other party for authentication to occur. Multifactor authentication is a potential solution to the authentication problem, and it is beginning to be implemented at websites operated by well-known companies. This article surveys the different mechanisms used to implement multifactor authentication. How a site chooses to implement multifactor authentication affects security as well as the overall user experience.}, keywords = {authentication attacks, authentication mechanisms, multifactor authentication, online security}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/716}, url = {http://timreview.ca/article/716}, author = {Jim Reno} }