Download PDF version Contact company

Wipro Lab45, the innovation lab of the technology services and consulting company, Wipro Limited announced the launch of its Decentralised Identity and Credential Exchange (DICE) ID, which puts users in control of their personal data and enables faster, easier, and more secure sharing of private information online. 

DICE ID 

Powered by blockchain technology, DICE ID enables the issuance and verification of tamper-proof, self-verifiable digital credentials. DICE ID stores verified personal information from certified issuers in an identity wallet owned by the user.

All data is encrypted and embedded and only received by the user in their own identity wallet. This digital wallet can be used to share identity or credentials for a wide range of purposes including current or potential employers, healthcare or financial services providers, or educational institutions.

Blockchain technology

DICE ID puts users in control of their personal data, enabling them to decide how much to reveal

DICE ID puts users in control of their personal data, enabling them to decide exactly how much and what type of information they want to reveal in digital settings.

DICE ID leverages the core tenets of blockchain technology to transform the way consumers manage their online identities,” said Subha Tatavarti, Chief Technology Officer, Wipro Limited.

Easy and safe data management

Current online identification relies on the use of single sign-on services, requiring users to share personal data with multiple third parties. DICE ID gives the power back to the individual, making it easier and safer than ever to manage to share of personal data on digital platforms."

"We believe decentralised identity and verifiable credentials technology will become a game-changer resulting in a metamorphosis of the identity space. And we are thrilled to be at the forefront of this innovative technology.” 

W3C open data model

DICE ID leverages W3C (World Wide Web Consortium) verifiable credential open data model, which makes credentials machine-readable and interoperable and allows for the secure exchange between ecosystem players.

Piloted by select clients since September 2022, DICE ID is already being applied in many ways, particularly proving powerful in credential verification for talent/crowd-sourcing purposes. 

Applications

Among the use cases for DICE ID are:

  • Ed-tech organisations, colleges, and crowdsourcing communities are using DICE ID to create a talent exchange ecosystem through portable skill credentials for learners and freelancers.
  • Fintech and financial institutions are using DICE ID to handle users' consent and share their data while preserving their privacy and confidentiality.
  • Health-tech startups are using DICE ID to safeguard medical data, enhancing patients’ trust in their platform.
  • Government-affiliated institutions are using DICE ID to help citizens prove their eligibility for benefits and other social schemes.
  • Metaverse platforms are using DICE ID to create Sybil-resistant communities through pseudonymous identities for avatars. 
Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?