Speaker "Jimmy Su" Details Back



Blockchain Based Identity Management


Fraud Terminator: Identity Management Powered by Role-based Permissioned Private Blockchain   Phone scam is a rampant epidemic throughout the world.  Criminals are taking advantages of innocent people by proposing wild schemes to con them of money and valuables.  The key questions are:   1.      How can we verify the caller is legitimate? 2.      How do I know calling me is part of the caller’s job? 3.      How do I know the caller is allowed to call me on this matter?   JD Security has developed an innovative identity management system called Fraud Terminator to solve exactly this problem.  The system uses a role-based permissioned private blockchain as the core infrastructure.  Multiple roles are created for the JD ecosystem including JD customer service representatives, delivery personnel, third-party vendor, consumers, and police.  This system ensures information is shared with the legitimate party in a timely manner, while allowing the consumers to control the sharing of her private information with fine-granularity control.


Dr. Jimmy Su leads the JD security research center in Silicon Valley. He joined JD in January 2017. Before joining JD, he was the director of advanced threat research at FireEye Labs. He led the research and development of multiple world leading security products at FireEye, including network security, email security, mobile security, fraud detection, and end-point security. He led a global team including members from the United States, Pakistan, and Singapore from research to product releases on the FireEye’s first machine learning based malware similarity analysis Cloud platform. This key technology advance was released on all core FireEye products including network security, email security, and mobile security. He won the Q2 2016 FireEye innovation award for his seminal work on similarity analysis. He earned his PhD degree in Computer Science at the University of California, Berkeley in 2010. After his graduation, he joined Professor Dawn Song’s team as a post doc focusing on similarity analysis of x86 and Android applications. In 2011, he joined Professor Song in the mobile security startup Ensighta, leading the research and development of the automatic malware analysis platform. Ensighta was acquired by FireEye in December of 2012. He joined FireEye through the acquisition. JD security research center in Silicon Valley focuses on these seven areas: account security, APT detection, bot detection, data security, AI applications in security, Big Data applications in security, and IoT security.