Deployment Blockchain For SCM II
Deployment Blockchain For SCM II
Inclusive Deployment of
Blockchain for Supply Chains
Part 2 – Trustworthy verification
of digital identities
April 2019
World Economic Forum
91-93 route de la Capite
CH-1223 Cologny/Geneva
Switzerland
Tel.: +41 (0)22 869 1212
Fax: +41 (0)22 786 2744
Email: [email protected]
www.weforum.org
This white paper has been published by the World Economic Forum as a contribution to a project,
© 2019 World Economic Forum. All rights insight area or interaction. The findings, interpretations and conclusions expressed herein are a re-
reserved. No part of this publication may be sult of a collaborative process facilitated and endorsed by the World Economic Forum, but whose
reproduced or transmitted in any form or by any results do not necessarily represent the views of the World Economic Forum, nor the entirety of its
means, including photocopying and recording, or Members, Partners or other stakeholders.
by any information storage and retrieval system.
Contents
Preface 5
Introduction 6
Centralized 10
Federated 10
Decentralized 11
Next steps 21
Appendix 1: Workings of a 22
decentralized identity model
Verifiable credentials in 23
decentralized identities
Glossary 25
Contributors 27
Endnotes 28
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 3
4 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Preface
Derek Supply chains are becoming increasingly digital. A central requirement of these digital business
O’Halloran, networks is the ability to effectively make use of partners in a trustworthy way. As such, organizations
Head, Future of need a comprehensive system for the verification and management of digital business identities that is
Digital Economy both dynamic and trustworthy.
and Society,
Member of Despite recent improvements in digital identity verification systems, they need further development
the Executive to support the supply chains of the future. New demands on the digital identities of legal entities and
Committee possibilities for supply-chain organizations will likely be ushered in by the Fourth Industrial Revolution –
with shifts enabled by the internet of things (IoT), artificial intelligence (AI) and, in particular, distributed
ledger technology. The pace of development is faster than ever before, and decision-makers need to
Manju George, re-evaluate the systems they have in place to manage digital identities.
Head of Platform
Services and This paper advances two topics identified by the World Economic Forum:
Public-Private
Cooperation 1. This is the second white paper in a series and part of a broader project focused on the co-creation
of new tools and frameworks to shape the deployment of distributed ledger technology in supply
chains towards interoperability, integrity and inclusivity. The World Economic Forum’s Centre for
Nadia Hewett, the Fourth Industrial Revolution is working with a multistakeholder group to produce a project that
Project Lead, includes:
Blockchain and
Distributed Ledger –– A series of white papers published in 2019. Collectively and individually, these papers will offer
Technology insights into and explorations of specific considerations for decision-makers in harnessing
blockchain technology effectively.
–– A concise, easy-to-use toolkit to be released at the end of 2019 covering important topics for
supply-chain decision-makers to consider for responsible blockchain deployment.
2. It contributes to the ongoing development of understanding about and the deployment of “good
digital identities” for the Fourth Industrial Revolution.
As digital business interactions flow across borders in international supply chains, there will be many
cases in which parties do not know each other before they conduct business together. It is our hope
that the following overview of the opportunities, risks and some suggested next steps will stimulate
stakeholders to embark on a new and exciting action agenda to build digital identity systems that are
prepared for future supply chains.
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 5
Introduction
Digital identity ensures integrity in connecting the The paper investigates the possibilities enabled by a digital
physical and the digital world. In global digital supply-chain Global Trade Identity4 (GTID) for legal entities participating
transactions, it is essential for a legal entity to prove its own in global supply chains. The intention is that GTID is used
identity and check those of other parties, each of which for any business interactions in global supply chains and
requires a unique, verifiable and authentic digital identity. enables any supply-chain partner to dynamically validate
the trustworthiness of a legal entity with which it is about to
While this paper can be read alone, it does not introduce engage in a business interaction. The paper suggests that a
basic blockchain concepts. This is covered by the first World GTID is a prerequisite for efficient digitization of global supply
Economic Forum white paper in this series – for further chains and supports the digital era’s increased focus on
reference see Inclusive Deployment of Blockchain for Supply optimizing a business’s environment instead of organization-
Chains: Part 1 – introduction, April 2019. The first white paper centric optimization. The emergence of decentralized identity
covers topics such as basic blockchain concepts, blockchain systems is explored – which holds a unique opportunity for
features that are attractive for supply-chain solutions and the global supply-chain organizations and governments to create
findings on concerns that supply-chain actors have for the GTID systems that cater for future supply-chain interactions.
deployment of blockchain technology, including a concern The paper also highlights that decentralized identity systems
over trustworthy digital identity management that gave rise to are not yet ready for general use due to business, regulatory
this paper. This white paper therefore explores considerations, and technology challenges, but both the public and private
proposed principles and recommendations for supply-chain sector can already position themselves for future success.
organizations and governments in managing the growing
complexity of the digital identities of legal entities involved in While blockchain is one type of distributed ledger technology,
global trade. for simplicity, the terms are used interchangeably in this
paper to cover all types of distributed ledger technologies.
Other definitions pertaining to this paper can be found in the
Decentralization glossary.
New technologies and current advances in IT are
providing new paradigms in understanding how Trust matters
organizations can collaborate without relying on a trusted
intermediary and may bring transformative changes. The technology underpinning the GTID is the foundation
for enabling the dynamic validation of trust globally, but
Decentralized ledger technologies such as blockchain are there are many other non-technical considerations that
transferring the authority, risk and reward – of defining contribute to the trustworthiness of an entity, including
and enforcing system rules and record keeping – from procedures for issuing and proofing identities, how IT
a central entity to a group of entities of which none has systems are secured, how companies are managed,
controlling power.1 company ethics/cultures etc. These factors are outside
the scope of this paper.
Transactions and their details are recorded in multiple
places at the same time, without a central database or
administrator.2
6 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Trustworthy identity verification in global supply chains
Global supply chains span national borders and involve The current state of identity management consists of
businesses from different industries; actors need to work inefficient manual processes that could benefit from new
collaboratively to optimize the flow of physical goods, technologies and architecture to support digital growth.
information and financial transactions. Identity and trust As the number of digital services, transactions and entities
assurance lie at the core of each of these interactions. grows, it will be increasingly important to ensure that
Supply-chain organizations need to know and trust each transactions take place in a secure and trusted network
partner they are engaging with, prior to offering digital in which each entity can be dynamically identified and
services or access to resources. Organizations need to authenticated.5
ensure they are dealing with the right entity and efficiently
link a digital identity and a real organization, and more Today, most identity systems exist in isolation. Different
importantly evaluate the trustworthiness of a legal entity of public and private solutions record and maintain identical
interest. This process of dynamically verifying counterparts identity data potentially hundreds of times over, and are not
– digital identity management and verification – is a critical interoperable, creating a significant amount of redundant
step in establishing trust and assurance for organizations identity information. This is a waste of resources for the
participating in digital supply-chain transactions. network in question, is difficult to scale and is buried in error-
prone and paper-heavy processes.6
Why this is important: the digital identity
landscape
To prepare your organization’s supply chain for the
complexities of an increasingly digital world and the
adoption of emerging technologies such as blockchain,
this paper encourages governments, organizations and
the supply-chain industry to review the possibilities for new
emerging technologies and a digital GTID.
Figure 1: Identity management that is isolated today is moving towards becoming decentralized tomorrow7
Today Tomorrow
PLANT
TRUCK
BENEFICIAL CARGO OWNER
Certificate of Incorp. Certificate of incorp. Certificate of incorp.
Entity type Entity type Entity type
Address Address Address
ENTITY Operating licences ENTITY Operating licences ENTITY Operating licences
Permits Permits Permits
Significant holdings Significant holdings Significant holdings
IDENTITY
Certificate of incorp. Certificate of incorp. Certificate of incorp. Certificate of incorp.
Entity type Entity type Entity type Entity type
Address Address Address Address
ENTITY
ENTITY Operating licences ENTITY Operating licences ENTITY Operating licences ENTITY Operating licences
Permits Permits Permits Permits
Significant holdings Significant holdings Significant holdings Significant holdings
INSURANCE PORT
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 7
Also, the case for robust and scalable GTID becomes What is a digital identity?
clear when considering the advance of Fourth Industrial
Revolution technologies. As technologies such as Digital identity is a unique representation of a legal entity
blockchain, internet of things (IoT) and artificial intelligence engaged in an online transaction.8 It enables remote
(AI) advance supply chains, the systems by which interactions and trust between entities by providing vital
organizations verify identity should also do so. For example, information about the entity, ensuring that it exists in the real
the capabilities of blockchain mean that some future world.9
supply-chain transactions and business processes might
be handled by autonomous software agents (ASA) and In this paper we use the term proof of existence to cover
IoT, dynamically interacting with various parties on behalf any electronic information that can document that an
of legal entities, so placing greater emphasis on seamless entity is a legal entity under a specific jurisdiction. Digital
verification of identities. identity tools can be used for other purposes, such as for
authorization and providing information (e.g. export licences
The digital-business era requires enterprises to rethink many or C-TPAT certification) beyond simply authenticating a legal
aspects of their business models. Several enterprises in entity’s identity.10
global supply chains have moved their digitalization focus
outwards towards the business networks of which they This paper focuses on digital business-to-business (B2B),
are part. A GTID should enable identity verification that can business-to-government (B2G) and government-to-
be more efficient, scalable and sustainable and therefore government (G2G) interactions, and therefore does not
support digital optimization of business networks. cover individual or citizen-to-citizen relations and digital
identity considerations, requirements and solutions. We will
With the adoption of emerging decentralization identity briefly cover the employee-to-business relationship, but the
technologies – a nascent technology looked at in more detail paper’s focus is on legal entities.
later in the paper – there is the potential for a technology
that supports a GTID without giving power to a centralized
administrator. Proof of existence
Trustworthy digital identities of legal entities are a topic on In the identity context, a “proof of existence”, in its
the agenda across international trade organizations and simplest form, is a way to prove that an entity exists. In
governments, including: this paper, “proof of existence” covers any electronic
information which can document that an entity is a legal
–– The Belgium, Danish, Azerbaijani governments and entity under a specific jurisdiction. A globally recognizable
local governments such as the Government of British proof of existence does not need to exist. However, if any
Columbia and Ontario, as well as the European Union’s country issues some kind of digital or physical proof of
eIDAS initiative incorporation (incorporation is the legal process used to
form a corporate entity or company), that should be used
–– The United Nations (e.g. United Nations Economic and as proof of existence. In many countries the financial
Social Commission for Asia and the Pacific [ESCAP] and institutions are used as the trusted party that confirms
United Nations Commission on International Trade Law the validity of a physical proof of incorporation and issues
[UNCITRAL]), and the World Economic Forum public and a digital identity. How much trust an entity can place on
private collaboration on advancing good, user-centric such proof is up to each entity.
digital identities
Please note, digital identities issued within a country will
–– Private organizations such as Alastria, which focuses on not themselves constitute a GTID; however, these can be
Spanish-speaking countries used as the proof of existence to obtain a GTID.
8 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Digital identifier11
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 9
Choosing between three archetypes
Available identity systems can be categorized into three The service provider guarantees the identity of network
archetypes: centralized, federated and decentralized. As the participants, thereby acting as the central third party that
names indicate, it is their fundamental structures that set facilitates trust among otherwise unknown entities.
them apart from each other – with implications for adoption In a business network where supply-chain actors are
and trust levels, and advantages and challenges for digital interacting with multiple digital services, these actors
entities. For more details, please see the World Economic need to repeat registration activities for any digital service
Forum report published on 28 September 2018: Identity in a they intend to use. For example, if a shipper/exporter
Digital World: A new chapter in the social contract. uses its third-party logistics provider for documentation
management, does ocean freight shipping for one trade
Centralized lane with ZIM, which is using Wave’s blockchain-based bill
of lading solution, and deploys CargoX’s blockchain-based
In a centralized identity system, the provider of a digital bill of lading solution for all other trade lanes, it should repeat
service (the service provider – like a government’s Trade the identity process across all solution providers.
Single Window, a digital platform or a business application)
establishes and manages a consumer of digital service’s This is cumbersome, requiring identity and security experts
(service consumer) identities and related data in its systems. in place across processes and entities, and duplication of
Digital identities are currently mostly governed centrally, in work at each service provider. Handling trust multiple times
isolated architectures. A legal entity typically must prove across all supply-chain solutions results in hidden overhead
itself to each service provider to create its digital identity costs within the supply chain.
(Figure 2). Under this system, the service consumer has
almost no ability to manage its own identities and related Today, centralized identity systems are mature, with well-
attributes and must abide by the service provider’s terms defined standards and processes, and this is probably why
and conditions in order to establish and maintain its digital current providers of blockchain solutions mostly depend on
identity. It must rely on the service provider’s processes and centralized identity systems.
trust the service provider can handle its identity securely,
which puts obligations on the service provider and requires Federated
investment.
The federated identity concept is probably best known
in the consumer space, where, for example, Facebook
Figure 2: Centralized identity system and Google identities are trusted by many apps through
standardized protocols.
CENTRAL TRUSTED
IDENTITY DOMAIN
10 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Figure 3: Federated identity system A credential is a piece of information that an organization
(the credential issuer) has about an entity: e.g. Authorized
Economic Operator, export licence, freight forwarder licence,
CENTRAL TRUSTED
IDENTITY DOMAIN custom brokerage licence, authorization to issue certificate
CENTRAL TRUSTED
of origin, etc. A verifiable credential is digitally signed by the
IDENTITY DOMAIN credential issuer and includes a mechanism for dynamically
Domain – Domain verifying the validity of the credential (see Appendix 1).
Trust
CENTRAL TRUSTED
IDENTITY DOMAIN The issuing of standardized, tamper-resistant and non-
repudiable verifiable credentials by trusted entities is an
LEGAL ENTITY
CENTRAL TRUSTED important component of decentralized identities. The entity
IDENTITY DOMAIN
CENTRAL TRUSTED
IDENTITY DOMAIN
manages the distribution of verifiable credentials to providers
of digital service and includes relevant verifiable credentials
in its request to access a service. The service provider then
verifies the verifiable credential before granting access. An
For example, for many shippers and logistics operators example is the Verifiable Organizations Network (VON),
trying to plan cost-effective, time-efficient supply chains, established by the Government of British Colombia to create
the lack of visibility is a real obstacle. The International Port an improved methodology of finding, issuing, storing and
Community System Association (IPCSA) has created a sharing trustworthy data about incorporated organizations.14
Network of Trusted Networks, enabling the Port Community
Systems (PCSs) to trust each other, relying on the
authentication of a separate PCS to identify a new user. Figure 4: Decentralized identity system
IPCSA’s track-and-trace infrastructure makes it possible to
receive information not only from the PCS in the region but
globally from other PCSs.13
Verify Trust
COMMON TRUSTED IDENTITY DOMAIN
SERVICE PROVIDER
Examples of private federated identification systems in SERVICE PROVIDER
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 11
To enable the ability to interact with the right partner at the
right time it is important that each entity’s internal business
rules determine the level of trust of a self-managed identity
and related verifiable credentials. Compared to centralized
identity solutions this gives more control to the entity but
also shifts responsibility for managing its own identity and
validating other parties’ identities from the service provider
to the entity: This can be challenging to achieve, especially
for small to medium-size businesses, and may increase
the risk of fraud, so the most effective controls must be
identified and implemented.
12 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
How to determine the appropriate archetype
A comparison of the system features can help you decide decentralized solution is an idealized scenario that has not
which archetype is appropriate (see Figure 5). Due to the been truly implemented yet.
immaturity of technologies for decentralized identities, the
Examples INTTRA, GT Nexus, Amazon, Sweden’s BankID, Denmark’s British Colombia’s Orgbook and
Alibaba NemID, Canada’s SecureKey Ontario’s Verifiable Business
Concierge, GS1’s GTIN (products) Organisation Network (VON),
and GLN (locations), Amazon, Alastria Digital Identity
Facebook and Google Identity
Federation
Level of adoption Typical system today; widespread Some solutions in large-scale Adoption currently in early stages
and trust usage; identity standards and production; standards and protocols (mostly pilot, proof-of-concept).
protocols are mature are mature Standards and protocols to be
defined
Trade cost implications Needs limited capital cost to Needs medium capital cost Needs more capital cost upfront
realize at each service provider. All to realize within each domain. to realize but once operational, it
service providers have operational Operational cost is split at several has lower operational cost
costs service providers
Number of individual New digital identity required for New digital identity required for every One global trade identity for each
identities for every digital service provider. domain. organization.
participating in Business credentials created at Business credentials shared Business verifiable credentials
global trade each service provider throughout the domain from external independent
sources
Direct interactions Requires intermediary to facilitate Requires intermediary to facilitate Does not require intermediary to
in a peer-to-peer (P2P) trust trust facilitate trust; this is done by the
system protocol
Managing, controlling Organizations have low control Organizations have low control Organizations control their own
and protecting identity of their identity as this is done by of their identity as this is done by self-managed identity.
service provider service provider and federation Can be a complex task
partners
Tailoring Identity tailored to service Identity tailored to domain One size fits all as service provider
providers’ needs requirement needs to tailor the solution to the
decentralized identities. However,
the verifiable credentials can
be tailored to specific service
providers’ needs
Siloed identity Several siloed identity Several siloed identity architectures No identity silo – requires a
architecture architectures decentralized ledger
Single trusted and Requires one centralized entity to Several centralized entities can issue Requires a global recognized
shared identity in issue one identity for all entities identities; the global recognition is decentralized infrastructure
global trade globally performed through federation network and related protocols
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 13
Centralized, federated and decentralized identity trust A possible solution lies in formulating uniform legal rules
systems are not mutually exclusive; an organization or across jurisdictions on a global scale. Such legislative
government can deploy some or all systems to perform efforts aimed at creating an enabling legal environment for
different functions. Experts assume that most use-cases electronic exchanges across borders is a work-in-progress.
in global supply chains might require a hybrid system that Useful pieces of legislation already exist. Some of them
includes an integrated mix of the three and could come in may be found in recent free trade agreements and others
many shapes. in the United Nations Commission on International Trade
Law (UNCITRAL) texts. At the same time, it is important
Regulatory and legal considerations to update work while considering emerging concepts (e.g.
identity management) and emerging technology (such as
Note: This section15,16 is not an exhaustive list of all possible blockchain).
regulatory and legal considerations. Data localization laws
and personal data laws (such as GDPR) must be considered Decentralized identity systems also raise questions about
when relevant. private-key custody and storage. If the security of an
organization’s digital identity is only as secure as the private
The use of digital identity systems in global supply chains key tied to that identity, should service providers that sell
is inherently cross-border, which means parties operate in custody and storage solutions be subject to common
multiple jurisdictions. At present, national legal regimes take regulatory standards to protect their customers and the
divergent approaches to legislating/regulating for digital system as a whole?
identity. With the cross-border nature of international trade,
several legal issues arise. For instance, which law will apply Finally, the liability for systemic failure needs to be clear.
to establish the validity of a contract – and to an arbitration Where the identity system is powered by a permissionless
clause contained in an email exchange? decentralized network, there is no single centralized
operator of the network. There are also no legal acts or
Decentralized systems, such as blockchain, can encourage precedents answering the conflicts of law issues inherent in
the development of digital identity. However, where existing a decentralized system.
laws and regulations have been drafted to consider digital
identity (e.g. the eIDAS regulations in the European Union),
they have tended to be drafted with a traditional view of UNCITRAL work on cross-border legal recognition of
data and digital identity – i.e. based on centralized, rather identity management and trust services
than decentralized systems. This means the regulations
are not fully consistent with a decentralized system of In 2018, UNCITRAL asked its Working Group IV
digital identity, therefore organizations could miss out on a to investigate legal aspects of identity management
potentially promising archetype. and trust services, namely to facilitate cross-border
legal recognition in commercial transactions. Ongoing
discussions include relevant entities (physical and legal
persons as subjects of rights and objects of identification;
physical and digital objects as objects of identification
only) and legal mechanisms to achieve cross-border
recognition. Moreover, mapping identity schemes against
outcome-based descriptions of levels of assurance to
establish their equivalence has been suggested. The
availability of certification and supervision schemes may
also play a significant role in the recognition process.
14 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Designing identity systems for future supply chains
The move to digitally optimizing business networks favours –– Competitively neutral: The GTID model should not give
a model of dynamic validation of trustworthiness of any a competitive advantage to any one organization.
legal entity. Ultimately, the goal should be the most fluid
supply chain and identity verification to engage legal entities, –– Independence: There should not be a lock-in to any one
things and automonous software agents. This means the entity for any important system functions or processes.17
right services can be offered at the right time – without the There cannot be a single entity controlling critical parts of
cumbersome task of registering and approving supply-chain the GTID.
partners ahead of the interaction, and without a central
entity controlling a legal entities’ GTID. –– Viable and sustainable: The system is sustainable as a
business and is resilient to shifting political priorities.18
The paper assumes there will only be one GTID platform;
however, there will likely be several that connect behind the –– Enable participation: The model should enable all
scenes. This is similar to the many internet service providers types of companies, including small and medium-sized
connecting to give the impression of one internet. enterprises, to more effectively participate in international
trade and enhance their competitiveness.
Identity system principles for future supply
chains Proposed digital identity model for future
supply chains
The following principles are proposed for a GTID model to
enable governments and business entities to have one self- Based on these principles the next section illustrates
managed digital identity throughout global supply chains: a model for GTID that aims to establish trust between
government-to-government (G2G), business-to-government
–– Global trustworthiness: Any government and business (B2G) and business-to-business (B2B) scenarios.
should be able to verify the trustworthiness of a legal
entity’s GTID and allow each legal entity to have internal The first section illustrates how a government can obtain
rules for trust validation. a GTID and authorize its Cross-Border Regulatory
Agencies (CBRA)19 to issue and sign digital licences,
–– Self-managed: Each government and business permits, certificates or other authorizations (LPCOs),20 an
must fully manage its own identity: e.g. it will not be authorization that can be validated dynamically by another
politically acceptable to have a third party managing a country’s CBRAs. The second section extends the GTID
government’s GTID. concept to B2G interaction, followed by the third section
that focuses on B2B interactions.
–– Support any digitization level: Countries and
businesses can benefit from the GTID irrespective of their The illustrated model is based on decentralized
level of technology and digitization readiness: e.g. within technologies; however, the model can also be realized with
a country, there are no internal requirements for digital centralized technologies by one supranational organization,
identities or digital issuance of incorporation documents. with centralized technologies by several organizations that
federate trust, or with decentralized technologies without a
–– Independence of jurisdiction: Each jurisdiction decides controlling organization, but still governed by a consortium
how much trust they will put into each GTID. of nations.
–– Cost-effective: The required investment must be Several elements necessary to realize a GTID are
affordable for any country irrespective of its economic progressing, such as the legal work under UNCITRAL,
development and for any business irrespective of its standardization and digitization of trade documents as
budget and technological readiness. well as several decentralized identity solutions like Civic,
Sovrin, Hyperledger Indy and uPort. However, there are
–– Politically neutral: The infrastructure must be politically no concerted efforts focused on realizing all of the pieces
neutral and support national policy frameworks, meaning needed for a complete GTID solution.
that no single country/region/organization can control the
infrastructure. It is not the intention of the illustrations to be technically
accurate and/or to include all possible details and
exceptions. The purpose is mainly to illustrate the model.
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 15
Trust between governments First step – establishing national government identity
(Figure 6): Each government issues a globally recognized
The main challenges in digital G2G interactions include self-managed digital identity (the GTID) to itself. It is
trusting that a digital LPCO – such as a certificate of origin, necessary to have a global trusted mechanism through
an inspection certificate, a special duty-free certificate etc. – which governments can manage their GTIDs. This is referred
was issued in the exporting country by an authorized CBRA, to as the Identity Trust Fabric (ITF).21 An entity verifies that
that the LPCO hasn’t been tampered with and that only it is genuinely the government that requested the GTID. To
authorized entities have access to the LPCO. support the political neutrality principle, it is recommended
that each government decides the verifying entity itself. The
identification of the verifying entity is stored as a verifiable
credential. If the government has not chosen a trustworthy
verifier, then other governments may not trust the GTID.
Therefore, there will likely be a global consensus on several
entities that are trusted to verify a government.
B Proof of existence
Govern-
ment
Identity Trust Fabric
A
C
A. Government creates self-managed identity
B. Trusted entity verifies it is the government that
controls the identity
C. Result: Government now has a global trusted
self-managed Global Trade Identity (GTID)
16 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Second step – establishing each CBRA’s GTID (Figure The government endorses a CBRA to issue a specific LPCO
7). The government issues a proof of existence to a CBRA by giving globally recognizable and verifiable credentials to
acknowledging it is a public authority under its jurisdiction. the CBRA. In global trade, there are fewer than 100 kinds of
The CBRA uses the proof of existence to obtain its self- LPCO used regularly. It will be necessary to standardize the
managed GTID. This step is repeated every time a CBRA in verifiable credentials informing that a CBRA is authorized by
a country is established. a government to issue a specific type of LPCO. This results
in technically simple, cost-effective and politically neutral
components that enable a government to confirm that a
CBRA is a trusted authority under a specific jurisdiction. The
CBRA can document through the verifiable credential that it
has been authorized to issue a specific LPCO.
Globally standardized
verifiable credential
Proof of existence
Govern-
ment
Identity Trust Fabric
B C
Government’s decentralized identity document
D A. Public authorities use a proof of existence to
create self-managed GTID
B. Government issues credential that says it is a
CBRA 1
public authority
A CBRA 1’s decentralized identity document
C. Government issues credential that says
! CBRA 1 is authorized to issue certificate of
A B C origin
… D. Government issues credential that says
CBRA 2..n A CBRA 2’s decentralized identity document CBRA 2 is authorized to issue export
declaration
E A B D E. This is repeated for each CBRA and for all
licences, permits, certificates or other
E authorizations
F. Result: The CBRAs can now globally
document that they are authorized to issue
certificates of origin, export declarations etc.
under a specific government’s jurisdiction
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 17
Third step – an exporting CBRA issues an LPCO in trader typically requests from the CBRA. Figure 8 illustrates
response to a request from a trader (Figure 8). An how the CBRA uses the GTID to sign the CoO and thereby
example of an LPCO can be a ‘certificate of origin’ (CoO), enable other entities to validate that it is authorized to issue
a document widely used in international trade, which a a CoO.
Globally standardized
verifiable credential
Proof of existence
Govern-
ment
Identity Trust Fabric Digital signature
Trader Certificate
of Origin
E
Fourth step – an importing CBRA verifies the LPCO The model uses conventional technologies such as digital
(Figure 9): A CBRA in the importing country can verify that signatures, hashing and standard encryption to ensure non-
the exporting CBRA which has digitally signed the LPCO is repudiation. As a result, the importing CBRA knows it is the
an authorized issuer of a specific LPCO under the exporting original document and that it has not been tampered with.
country’s jurisdiction. How the importing CBRA reacts
based on this verification depends on the local jurisdiction,
the amount of trust it has in the exporting country’s proofing,
validation and governance process, and the CBRA’s internal
business rules.
18 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Figure 9: CBRA in the importing country verifies that the CoO is signed by the authorized CBRA
Globally standardized
verifiable credential
Proof of existence
Govern-
ment
Identity Trust Fabric Digital signature
To ease the importing CBRA’s validation process, the Where G2G interactions only require trustworthy
exporting country’s government should digitally sign and authentication and authorization of the government
publish a simple tamper-resistant table stating which and its CBRAs, the identification of businesses is more
authorities should sign which LPCO. It enables the importing cumbersome, primarily due to the number of entities and
authority to validate that the digital signatures from the right the many different types of businesses and interactions.
authorities are on the LPCO.
A government can start with identification of businesses
The LPCO can be in any digital format: XML, JSON, PDF that have a special role in global trade that typically requires
or even a JPG picture taken with a mobile phone. An a certificate/permit/licence (e.g. customs broker, forwarder,
authorized CBRA’s digital signature on an LPCO increases chambers etc.). Similar to CBRA identities, the starting
the document’s trustworthiness. This flexibility lowers the point is when a government, using verifiable credentials,
demands of a country’s technical readiness and can be an has authorized an agency to approve the establishment
important first step in its digitization of LPCOs, supporting of a legal entity within its jurisdiction. When a business is
the any digitization level principle. incorporated, it will be equipped with a proof of existence
that it can use to request a GTID.
Trust between business and governments
With that in place, it is possible for everyone to see that this
Direct interactions between business and government business is a legal entity under a specific jurisdiction – and
during import/export/transit processes occur when a the business can request trusted entities to issue relevant
CBRA issues an LPCO to a business, and when a business verifiable credentials to be used in requests to access
presents an LPCO to a CBRA. Indirect interactions services. Generic verifiable credentials used within global
occur when a CBRA, as part of its risk assessment, uses trade must be standardized.
information from miscellaneous data sources that include
identity information about a business.
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 19
British Colombia and Ontario’s Verifiable The Global Legal Entity Identifier Foundation (GLEIF)
Organizations Network
For entities involved in financial transactions, the GLEIF is
The Canadian provinces of British Colombia and Ontario tasked with supporting the implementation and use of the
designed the Verifiable Organizations Network (VON) to ISO standard of Legal Entity Identifier (LEI). It connects
enable a trusted digital environment for their businesses. to vital reference information that enables precise and
Using the decentralized identity system Sovrin Network, unique identification of legal entities participating in
where they have placed their credential definitions and financial transactions. Each LEI contains information
verification keys, it aims to furnish businesses with a about an entity’s ownership structure and thus answers
trusted digital identity issued by their local government the questions of “who is who” and “who owns whom”.23
with which they can conduct their affairs globally.
20 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Next steps
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 21
Appendix 1: Workings of a decentralized identity model
In a decentralized identity model, both the original proof of existence of the legal entity as well as updates to the legal
entity’s verifiable credentials should be stored on a trusted shared ledger. The shared ledger should support trust,
assurance, provenance, security, scalability and efficiency.
A Decentralized Identifier (DID) is a globally unique identifier that does not require a centralized registration authority and is
created in a common trust domain called an Identity Trust Fabric (ITF) that stores the proof of identities and their verifiable
credentials cryptographically and immutably on the blockchain. The ITF is where supply-chain partners can verify the
authenticity of an identity as well as related verifiable credentials. The ITF is the component that circumvents the need for a
central identity provider to manage trust. Once a decentralized identity is established, any supply-chain partner can verify
relevant attributes regarding another supply-chain partner with which it is about to engage in a business interaction, either
by granting access or conducting a transaction. The decision on how much trust to place in the identity and its verifiable
credentials is made by each supply-chain partner individually. Please note, the DID is handled on a blockchain separate
from the transactional blockchain.
A DID document is tied to the decentralized identity. It describes the DID and contains the mechanism that an entity
can use to authenticate itself as the DID – typically, the public keys whose corresponding private keys are controlled by
the identified entity, as well as a set of service endpoints for interacting with the entity and other attributes or verifiable
credentials describing the entity. A service endpoint may represent any type of service the entity wishes to advertise.
The DID of the government in each country is the starting point for establishing the identity for any business (see section
Trust between governments). It is therefore necessary for all actors in global supply chains to trust these government DIDs.
This can either be achieved by every business registering and maintaining these DIDs in their internal system, or there could
be a trusted service keeping track of the government DIDs. This trusted service can be operated by a central organization,
but this will give a significant amount of authority to this organization. Instead, a decentralized service in which more entities
could share the authority and governance would distribute the authority across the globe, preventing central control by a
single organization.
To enable trust between IoTs as well between IoTs and other business entities, an entity should associate the identifier of
IoTs and other agents that operate on its behalf with its business identity.
An identity system can be completely decentralized by using trustless, permissionless blockchain networks. However, this
model typically does not meet most business risk-management requirements. As a result, permissionless blockchains may
not be usable, though they eliminate the need for a central governing body. The required control can be achieved if a single
organization operates the Identity Trust Fabric, but this will only be a simulated decentralization. It is more realistic that
the Identity Trust Fabric will be formed by a consortium of preselected trusted nodes building a permissioned blockchain.
Please note that partners in the consortium do not have to be part of the supply chain; the supply-chain partner simply
needs to trust the consortium. This should give sufficient decentralization and thereby offer sufficient neutrality in the Identity
Trust Fabric operating model. An example is the G2G model discussed on page 13, where each country could operate one
blockchain node or have regional blockchain nodes: e.g. for the European Union.
22 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Verifiable credentials in decentralized identities
A credential is a piece of information that a credential issuer has about an entity. The credential issuer digitally signs the
credential and gives it to the entity, which then includes it in its request for access to a service. The service provider
should then be able to verify the cryptographic signatures of the credential issuer before granting access to the service
(see Figure 10).
Verifiable credentials should be based on standardized credential schemas that are available on the Identity Trust Fabric,
thereby making verifiable credentials understandable for any supply-chain actors. It should also be possible for each
entity to request additional information regarding the DID from other parties (e.g. if the shipper has an export licence for
specific cargo). However, it must be controlled by the holder of the DID, so the holder is always in control of identity-
related interactions.
This enables a dynamic concept, as the trust can increase after the basic level of trust through the initial proof of
existence has been established, by having more service providers to attest a business identity and verify additional profile
credentials with their digital signature. This history of trust will be available in the Identity Trust Fabric. Please note this
also includes the possibility of degrading trust and attributes.
During an interaction, an entity presents the identity and credentials and the other party should be able to verify it. This
means that issuers of verifiable credentials and proof of existence should be ready to immediately verify the validity of its
assertion, in addition to having trustworthy processes for maintaining the identifiers (see Figure 11).
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 23
Figure 11: Sample flow of presentation, verification and interaction to access service
PoE
Inspects PoE and
PoE requests validation if
Confirms proof of
needed existence
Valid
Sends additional
Requests additional
credential –
credentials to allow
Including verification
access to service
instructions
In a government-controlled model, the government creates a legal foundation that outlines how to identify public
authorities and how legal entities are created and governed within that jurisdiction. Government-issued identities are
typically stable and uniquely identify a business entity and, as such, are the foundation of all interactions with the outside
world. Government-issued identifiers are a must in the current, primarily centralized identity model – and governments
continue to have a vital role in a decentralized global supply-chain solution.
A public authority registers and identifies legal entities within its jurisdiction, based on the legal foundation. This assumes
that the government identity issuance systems and processes are not compromised or destroyed/corrupted. In that
case, as well as with war-torn countries, alternatives like the United Nations or other mechanisms should be available for
legal entities wanting to participate in global supply chains.
The public authority must ensure that updates to the legal status of an entity are continuously maintained and
immediately communicated. As soon as a legal entity changes status, it should be communicated directly from the
public authority and made available for all participants in the supply chain that intend to interact with the legal entity.
For example, this status can be a filing for bankruptcy, a change of ownership, the redrawing of licence to transport
dangerous goods etc.
Building upon the government-controlled model, there are also non-government-controlled models, such as an industry
identification scheme. Here, all entities in the network trust that the non-government entity has verified the existence of
the legal entity. The non-government entity typically adds industry-specific verifiable credentials to the identity, which
can be in different contexts, such as finance, insurance, logistics, audit/compliance etc. These DIDs do not replace
government-issued DIDs but complement them in an industry-specific context. A business partner should still be able to
track the industry DID to the government DID.
24 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Glossary
Authentication: Verifying the identity of a user, process Digital identity: A unique representation of a subject
or device, often as a prerequisite to allowing access to engaged in an online transaction. A digital identity is
resources in an information system. (NIST SP 800-128) always unique in the context of a digital service, but does
not necessarily need to uniquely identify the subject in all
Authorization: The process of verifying that a requested contexts. (NIST SP800-63-3)
action or service is approved for a specific entity. (NIST SP
800-152) Digital signature: A specific type of electronic signature
(e-signature) that relies on public-key cryptography to
Authorized Economic Operator: A party involved in the support identity authentication and provide data and
international movement of goods, in whatever function, that transaction integrity.
has been approved by, or on behalf of, a national customs
administration as complying with WCO or equivalent eIDAS: The eIDAS Regulation 910/2014 sets a framework
supply-chain security standards. (WCO SAFE Framework of for electronic identification and trust services for electronic
Standards) transactions in the European single market. (European
Commission)
Autonomous software agent (ASA): An autonomous
software agent is a component that has the intelligence Electronic Product Code Information Service (EPCIS):
necessary to autonomously decide when to perform an A GS1 standard that enables trading partners to share
action. An ASA runs autonomously on the blockchain information about the physical movement and status of
and enables members of a network to collaborate and products as they travel throughout the supply chain. (GS1)
negotiate transactions among themselves on behalf of, and
instructed by, the entities controlling them. It is also called a Fourth Industrial Revolution: A technological revolution
decentralized application (Dapp). driven by advances in science and technology. Scientific
breakthroughs and emerging technologies are advancing
Consortium: A group of people, countries, companies etc. at an unprecedented speed and include technologies such
who are working together on a particular project. (Oxford as blockchain and distributed ledger technology, artificial
Learner’s Dictionary) intelligence, autonomous driving, precision medicine, drones
and the internet of things, among others.
Credentials: An object or data structure that authoritatively
binds an identity – via an identifier or identifiers – and The General Data Protection Regulation (GDPR):
(optionally) additional attributes, to at least one authenticator A regulation on the protection of natural persons with
possessed and controlled by a subscriber. (NIST SP 800- regard to the processing of personal data and on the free
63-2) movement of such data. (Regulation (EU) 2016/679)
Cross-border regulatory agency (CBRA): Cross-border Global Location Number (GLN): The GLN is part of a GS1
regulation of international trade involves many government standard used for any location (physical, operational or legal)
agencies. These include agencies dealing with trade that needs to be identified for use in the supply chain. (GS1)
in goods that affect human health (e.g. food safety,
pharmaceuticals, cosmetics and dangerous drugs, to name GS1 barcode: Barcodes are symbols that can be scanned
a few). Other agencies might, for example, deal with public, electronically using laser or camera-based systems.
environmental or biosafety. The precise number of agencies They are used to encode information such as product
depends on the compliance profile of the country. (World numbers, serial numbers and batch numbers. Barcodes
Customs Organization) play a vital role in supply chains, enabling parties like
retailers, manufacturers, transport providers and hospitals
Cryptographic techniques/Cryptography: A discipline to automatically identify and track products as they move
or technique that embodies principles, means and through the supply chain. (GS1)
mechanisms for the transformation of data in order to hide
its information content, prevent its undetected modification Identity Trust Fabric (ITF): A common trust domain where
and/or prevent its unauthorized use. (ISO/IEC 74498-2: entities immutably store the proof of identities and their
1989, ISO/IEC SD6) verifiable credentials on the blockchain and where supply-
chain partners can verify the authenticity of an identity as
Digital document: Digital information that has been well as related credentials.
compiled and formatted for a specific purpose, that includes
content and structure and may include context. (Glossary of
Archival and Records Terminology)
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 25
Internet of things: A network of items – each embedded
with sensors – that are connected to the internet.
Mutual recognition: A principle of international law whereby
states party to mutual recognition agreements recognize
and uphold legal decisions taken by competent authorities
in another member state.
26 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
Contributors
The World Economic Forum’s Centre for the Fourth Industrial Revolution’s Blockchain for Supply Chain project is a global,
multi-industry, multistakeholder endeavour aimed at co-designing and co-creating frameworks. The project engages
stakeholders from multiple industries and governments from around the world. This report is based on numerous
discussions, workshops and pieces of research and the combined effort of all involved. Opinions expressed herein may not
necessary correspond with those of each individual involved with the project.
Sincere thanks are extended to those who contributed their unique insights to this report. We are also very grateful for the
generous commitment and support of the fellow at the Centre dedicated to the project: Soichi Furuya from Hitachi.
Lead Authors
Contributors
Commentators
Ashley Lannquist, Project Lead, Blockchain and Distributed Ledger Technology, World Economic Forum, United States
John Jordan, Executive Director, Emerging Digital Initiatives, Province of British Columbia, Canada
Kai Wagner, Partnership Development, Jolocom, Germany
Kimberley Botwright, Community Lead, Global Trade and Investment, World Economic Forum, Switzerland
Saverio Puddu, Tech and Data Protection, Baker McKenzie, Italy
Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities 27
Endnotes
1. Homan Farahmand, A Technical Primer for Assessing a Blockchain Platform, Gartner, 21 March 2017.
2. ibid.
3. Tae Il Kang, Director General of the Information and International Affairs Bureau, Korea Customs Service, “Korea Pilots
Blockchain Technology as it Prepares for the Future”, WCO News: https://mag.wcoomd.org/magazine/wco-news-88/
korea-pilots-blockchain-technology-as-it-prepares-for-the-future/ (link as of 26/3/19).
4. This term was coined by Henrik Hvid Jensen, 2019.
5. World Economic Forum. Digital Identity: On the threshold of a digital identity revolution, 2018.
6. World Economic Forum. Identity in a Digital World: A new chapter in the social contract, 2018.
7. World Economic Forum. Identity in a Digital World: A new chapter in the social contract, 2018.
8. https://www.nist.gov/ (link as of 26/3/19).
9. World Economic Forum, Making Deals in Cyberspace: What’s the problem?, 2017.
10. ibid.
11. ISO/IEC 29115:2011
12. Lucy Hakobyan, Mobility Open Blockchain Initiative, 2018.
13. https://ipcsa.international/ (link as of 26/3/19).
14. https://github.com/bcgov/von (link as of 26/3/19).
15. Prepared by Stuart Davis, Latham & Watkins, 2019.
16. Prepared by Luca Castellani, United Nations Commission on International Trade Law, 2019
17. Global Legal Entity Foundation (GLEIF).
18. World Economic Forum principles of digital identity systems for people.
19. World Customs Organization, 2011.
20. ibid.
21. Christy Pettey, The Beginner’s Guide to Decentralized Identity, Gartner, 28 June 2018, https://blogs.gartner.com/
smarterwithgartner/author/cpettey/ (link as of 28/3/19).
22. https://www.gleif.org/en/ (link as of 26/3/19).
23. World Economic Forum, A Blueprint for Digital Identity, 2016.
24. https://ipcsa.international/ (link as of 26/3/19).
28 Inclusive Deployment of Blockchain for Supply Chains: Part 2 – Trustworthy verification of digital identities
The World Economic Forum,
committed to improving
the state of the world, is the
International Organization for
Public-Private Cooperation.
[email protected]
www.weforum.org