Download PDF version Contact company

Wipro Lab45, the innovation lab of the technology services and consulting company, Wipro Limited announced the launch of its Decentralised Identity and Credential Exchange (DICE) ID, which puts users in control of their personal data and enables faster, easier, and more secure sharing of private information online. 

DICE ID 

Powered by blockchain technology, DICE ID enables the issuance and verification of tamper-proof, self-verifiable digital credentials. DICE ID stores verified personal information from certified issuers in an identity wallet owned by the user.

All data is encrypted and embedded and only received by the user in their own identity wallet. This digital wallet can be used to share identity or credentials for a wide range of purposes including current or potential employers, healthcare or financial services providers, or educational institutions.

Blockchain technology

DICE ID puts users in control of their personal data, enabling them to decide how much to reveal

DICE ID puts users in control of their personal data, enabling them to decide exactly how much and what type of information they want to reveal in digital settings.

DICE ID leverages the core tenets of blockchain technology to transform the way consumers manage their online identities,” said Subha Tatavarti, Chief Technology Officer, Wipro Limited.

Easy and safe data management

Current online identification relies on the use of single sign-on services, requiring users to share personal data with multiple third parties. DICE ID gives the power back to the individual, making it easier and safer than ever to manage to share of personal data on digital platforms."

"We believe decentralised identity and verifiable credentials technology will become a game-changer resulting in a metamorphosis of the identity space. And we are thrilled to be at the forefront of this innovative technology.” 

W3C open data model

DICE ID leverages W3C (World Wide Web Consortium) verifiable credential open data model, which makes credentials machine-readable and interoperable and allows for the secure exchange between ecosystem players.

Piloted by select clients since September 2022, DICE ID is already being applied in many ways, particularly proving powerful in credential verification for talent/crowd-sourcing purposes. 

Applications

Among the use cases for DICE ID are:

  • Ed-tech organisations, colleges, and crowdsourcing communities are using DICE ID to create a talent exchange ecosystem through portable skill credentials for learners and freelancers.
  • Fintech and financial institutions are using DICE ID to handle users' consent and share their data while preserving their privacy and confidentiality.
  • Health-tech startups are using DICE ID to safeguard medical data, enhancing patients’ trust in their platform.
  • Government-affiliated institutions are using DICE ID to help citizens prove their eligibility for benefits and other social schemes.
  • Metaverse platforms are using DICE ID to create Sybil-resistant communities through pseudonymous identities for avatars. 
Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?