We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byNathan O'Donnell
Modified over 4 years ago
© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010
© 2010 IBM Corporation Governments leverage many forms of information… …to establish ones identity footprint Public Records Commercial Information Biometrics Other Government IDs
© 2010 IBM Corporation But each step of the identity process can be exploited… Proofing documents can be fraudulent or fraudulently obtained Commercial evidence of identity – utility bills, credit cards, bank statements – speak to ability to pay, not identity Biometrics dont work for every person/application and some can be spoofed … resulting in identities that cannot be trusted Knowledge-based authentication: possession of a key or correct information may be problematic More secure identity documents may decrease vigilance and increase risk
© 2010 IBM Corporation A strategy for establishing greater trust in identities Start with solutions that consider the importance/value/risk of each identity and transaction Implement identity as a brokered service – tap into ID data where it resides rather than assembling a massive database of sensitive personal data Better use what already exists: clean up and leverage existing data Constantly monitor, assess and risk score the accuracy/integrity of data sources Conduct thorough and continuous vetting of every enrollee & user Obtain, manage and regularly update user consent Exceptions will occur! Solutions must handle them expeditiously to avoid security vulnerabilities
© 2010 IBM Corporation Sally checks in at airport using her government ID A Day in the Life of a Trusted Identity User Sally is off to a business meeting with a client in another city Sally stops at an ATM to reload her bank card Sally zips thru airport security via the fast-path lane At destination Sally takes subway using her bank card Sally has lunch at a local deli, pays with her employee ID Sally uses her bank card to access her hotel room Sally stops by a local office after client meeting Sally unlocks and starts the car with her fingerprint key fob Sally checks in for her return flight using her government ID Sally auto-registers in the clients visitor system with her employee ID Sally checks into hotel using her bank card and government ID After work Sally buys dinner with her bank card Sally leaves her house, locking up with a swipe of her finger Sally authorizes stock sale with her mobile device Sally checks her eBay account using her mobile phone to pay via PayPal Sally accesses her corporate network using her employee ID Sally buys from a vending machine with her mobile phone
© 2010 IBM Corporation Questions/Comments? Denny Carlton: Dennis.Carlton@us.ibm.comDennis.Carlton@us.ibm.com
Metropolitan Transportation Authority New Fare Payment Systems Update Presentation to Capital Program Oversight Committee May 23, 2011.
© 2012, Region One Education Service Center P-CARD BEST PRACTICES AND COMMON PITFALLS Frances Guzman Deputy Director for Business Operations and Finance.
Credit and Credit Cards
Mobile payment and Sonera. Finland as a Mobile Commerce Lab Mobile penetration 84% - no handset subsidy Hardly at all prepayment subscribers Premium rate.
Financial Education Jr. Chapter 2013 SHPE Foundation.
Building Bucks Basic Financial Services. Financial Institutions 3 Main Types – Banks – Credit Unions – Savings and Loan Associations (S&L) Advantages.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Final Exam Review.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Managing Your Credit 2014/2015 Office of Student Financial Assistance.
1 Identity Theft and Phishing: What You Need to Know.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Sample Check Register. Sample Blank Check Register.
Personal Finance Activity
How to Manage Your Cash › Daily Cash Needs Lunch, movies, gas, or paying for other activities Carry cash Go to an ATM Credit Card Know pros.
ATM with Biometric Technology
$$$$$$$ Know your Money! Financial Institutions and Services.
© 2018 SlidePlayer.com Inc. All rights reserved.