DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.

Slides:



Advertisements
Similar presentations
GSC: Standardization Advancing Global Communications ITU-T Status Report on standardization of Networked RFID P.A. Probst/Chairman of ITU-T SG16 SOURCE:ITU-T.
Advertisements

ITU-T activity in ICT security
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Wayne Zeuch, ATIS ATIS Cybersecurity Standards Document No: GSC16-GTSC9-10 Source: ATIS Contact:
Cloud computing security related works in ITU-T SG17
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Recent Standardization Activities on Cloud Computing Kishik Park, Kangchan Lee, Seungyun Lee TTA.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All The Internet of Things (IoT) aka Machine 2 Machine (M2M) Bilel Jamoussi Chief, Study Groups Department.
The 6th CJK IT Standards Meeting April 10 ~ 12, 2006, Hangzhou, China CJK IT Standards Meeting (Collaboration of Security Activity between CJK On NGN and.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur.
GSC16-OBS-03 ITU-T GSC – 16 Observer Presentation Karen Higginbottom, JTC 1 Chair.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
DOCUMENT #:GSC15-PLEN-47r1 FOR:Presentation or Information SOURCE:CCSA AGENDA ITEM:6.9 CCSA Standardization activities on.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
DOCUMENT #:GSC15-PLEN-46 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.9 CONTACT(S):Michael J. Fargano, Qwest,
DOCUMENT #:GSC15-PLEN-08 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (4.5) CONTACT(S):Jim MacFie ISACC Activities Since GSC-14 Jim MacFie.
DOCUMENT #:GSC15-PLEN-11 FOR:Presentation SOURCE:TTA AGENDA ITEM:Plenary 4.8 TTA activities since GSC14 Keun Hyeob LEE, TTA President.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All High Intelligent Network (Smart Pipe) Yuqing CHEN CCSA Document No: GSC16-PLEN-75 Source: CCSA Contact:
Introduction to Object Identifiers (OIDs) France Telecom Orange Olivier Dubuisson 15 June 2009.
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
SCC Activities C. Tilton. Standards Are applied to SOMETHING Within some CONTEXT Something = ID Ecosystem Context = Use Cases 2.
DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies.
DOCUMENT #:GSC15-PLEN-26 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.4 CONTACT(S): James McEachern ATIS Identity Management.
06/10/2015 End-to-End Quality of service in ITU-T Where we are, Perspectives Jean-Yves Monfort France Telecom, R&D Division ITU-T SG 12 Chairman 1GSC-9,
Proposal for OID-based M2M Node ID Group Name: WG2 Architecture at TP#8 (Miyazaki, December 2013) Source: Yong-Suk Park, KETI, Meeting.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
1 CJK9, Zhangjiajie, China NID-related activities in ITU-T Document number Zhangjiajia, China 8-10 April 2009 Hyoung Jun KIM, Jun Seob LEE
International Telecommunication Union Eighth Global Standards Collaboration (GSC) Meeting - Ottawa, Canada, 27 April-1 May 2003 Security Standardization.
International Telecommunication Union ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union ICANN.
DOCUMENT #:GSC15-PLEN-51 FOR:Presentation SOURCE:ITU AGENDA ITEM:Plenary 6.10 Conformance and Interoperability Testing.
ITU Overview Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-XXXX-nn FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
Progress on Identity Management: A Canadian Perspective on GSC Resolution 14/4 Colman Ho ISACC DOCUMENT #:GSC15-PLEN-28 FOR:Presentation SOURCE:ISACC AGENDA.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
The status of OID policy in Korea 李昇宰 (Yi, Seung-Jai) TTA.
DOCUMENT #:GSC15-PLEN-58 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.1 CONTACT(S): Marylin Arndt, TC M2M chair M2M and Internet of Services "When the.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
ITU-T SG16 and JCA-IoT activities
DOCUMENT #:GSC15-PLEN-82r2 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
TTA activity on Cyber Security and Protection of PI/PII/LI 14 July, 2008 Heung-youl Youm, Sun Kim TTA, Korea DOCUMENT #:GSC13-PLEN-23 FOR:Presentation.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on NGN in CCSA Duo LIU Deputy Secretary General of CCSA Global Standards.
Fostering worldwide interoperabilityGeneva, July 2009 IdM and Identification Systems Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems;
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
Fostering worldwide interoperabilityGeneva, July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
ITU - Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-PLEN-44 FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
IdM: Platform for Ubiquitous Chae Sub LEE DOCUMENT #:GSC13-PLEN-12 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:Plenary 6.4
Fostering worldwide interoperabilityGeneva, July 2009 Support convergences over NGN Chaesub LEE, ITU-T SG13 Chairman, followed by Global Standards.
1 CJK9, Zhangjiajie, China NID OID allocation status and registration process Document number Zhangjiajia, China 8-10 April 2009 JungJung Na
SDO/Forum Collaboration: An Essential Part of ICT Management Dave Sidor Chairman, ITU-T SG 4 Nobuo Fujii Vice Chairman, ITU-T SG 4 DOCUMENT #:GSC13-PLEN-10.
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
DOCUMENT #:GSC15-PLEN-27 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.4 CONTACT(S): Amardeo Sarma, ISG INS Chair Identity & Access Management activities.
ITU-T SG17 Q.3 Telecommunication information security management An overview Miho Naganuma Q.3/17 Rapporteur 17 March 2016.
ITU-T SG17 Q.2 Security Architecture and Framework An overview for newcomers Patrick Mwesigwa Q.2/17 Rapporteur 15 March 2016.
International Telecommunication Union ICT Security Role in National Trusted Identities Initiatives Abbie Barbir, PhD ITU-T Study Group 17 Identity Management.
Issues need harmonization
The ITU-T X.500 series and X.509 in a changing world
OID for Global ID system
Federated IdM Across Heterogeneous Clouding Environment
Global Standards Collaboration (GSC) GSC-15
Yong-Woon KIM HyoungJun KIM TTA
28 May ~ 2 June, 2006 HyoungJun KIM TTA/ETRI
28 May ~ 2 June, 2006 Hyoungjun KIM TTA/ETRI
ITU-T SG17 Q.3 Telecommunication information security management
ITU-T Study Group 17 Security
Martin Euchner, Advisor, ITU-T Study Group 17
Recent Standardization Activities on NID
Reinhard Scholl, GTSC-7 Chairman
ITU-T activity in ICT security
Recent Standardization Activities on Cloud Computing
Presentation transcript:

DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong CHEN SG 17 Vice Chairman Global Standards Collaboration (GSC) GSC-15

Identity Management (IdM) for Telecom is an Essential Part of IP-based Networks and Services  Identity-based services are exponentially increasing and available on many different mobile platforms  Internet is a part of telecommunication infrastructure  Next-Generation business model for network operators demands subscriber-centric data consolidation 2

 Per GSC-14/04 Resolution, ITU-T is progressing the development of a publically available Wiki- based inventory of major IdM initiatives and activities.  ITU-T works collaboratively with other key bodies including: ISO/IEC JTC 1/SC 27, ETSI, Kantara Initiative, FIDIS, OASIS  The focus of ITU-T’s IdM work is on global trust and interoperability of diverse IdM capabilities in telecommunications to include leveraging and bridging existing solutions. It is not in the development of standards for new IdM solutions.  ITU-T’s JCA-IdM (Joint Coordination Activity) coordinates IdM activities within ITU-T and amongst other major IdM standards bodies. Highlight of IdM Current Activities (1/2) 3

 First ITU-T IdM Recommendation published early 2009: Y.2720, NGN identity management framework  Joint ITU-T | ISO/IEC common text Recommendation | International Standard on Entity Authentication Assurance is approaching a stable document.  Three ITU-T Recommendations were published and available for free download X.1250, Baseline capabilities for enhanced global identity management trust and interoperability X.1251, A framework for user control of digital identity X.1252, Basic IdM terms and definitions 4 Highlight of IdM Current Activities (2/2)

Identity Federations based on standardized trust frameworks and global interoperability of diverse identity management solutions are major inhibitors to wide scale deployment of IdM capabilities Discovery of identity resources on a global level vs within an enterprise environment. Common IdM terminology Interoperability of Assurance Levels that are based on the risk assessment associated with the on-line transaction Privacy services Challenges for IdM 5

Next Step/Action for IdM x.evcert Extended validation certificate (EVcert) framework X.EaaInformation technology – Security techniques – Entity authentication assurance X.idm-dmCommon identity data model X.idm-ifaFramework architecture for interoperable identity management systems X.idmsgSecurity guidelines for identity management systems X.privaCriteria for assessing the level of protection for personally identifiable information in identity management X.authiGuideline to implement the authentication integration of the network layer and the service layer. X.giimmechanisms to support interoperability across different IdM services. X.idmgenGeneric Frame for Interoperable IdM systems X.sap-4The general framework of combined authentication on multiple identity provider service environment x.oitfOpen Identity Trust Framework x.discoveryDiscovery of identity management information x.mobidBaseline Capabilities and mechanisms of Identity Management for Mobile applications and environment 13 Recommendations are in developing. Among them, X.evcert plan to be determined in December meeting.

Basic Concepts of Object Identifiers (OIDs)  One of many identification schemes  Basically very simple: A tree  Arcs are numbered and may have an associated alphanumeric identifier (beginning with a lowercase)  Can also have Unicode labels (any language, any characters)  Infinitely many arcs from each node (except at the root)  Objects are identified by the path (OID) from the root to a node  A Registration Authority (RA) allocates arcs beneath its node to subordinate RAs, and so on, to an infinite depth  The OID tree is a hierarchical structure of RAs  Standardized in the ITU-T X.660 | ISO/IEC 9834 series (ITU-T SG 17 and ISO/IEC JTC 1/SC 6)  Originated in 1985, still in use, and still developing!  Recent developments are use of the DNS to provide information about the node identified by an OID. 7

Next Step/Action for OID OID Resolution system  Provides information associated with any object identified by an OID: access information child node information OID-IRI canonical form  Joint work between ITU-T SG 17 and ISO/IEC JTC 1/SC 6 since Oct (draft Rec. ITU-T X.672 (ex X.oid-res) | ISO/IEC )  Get an OID identifier arc assigned for identifying cybersecurity organizations, information, and policies  Specifies: OID resolution architecture OID resolution protocol (based on DNS) operation of the OID resolution service security and trust of the OID resolution process etc.  Associated is another joint work on procedures for the OID-RES operational agency Rec. ITU-T X.673 | ISO/IEC

Conclusions  Developers can bet on identity as a capability  User acceptance will gate success  Privacy is not opposed to security – it is a precondition of security  GSC-15 should continue GSC14/04 Resolution with some necessary editorial updates 9

Supplementary Slides 10

Weblinks ITU-T SG T/studygroups/com17/index.asphttp:// T/studygroups/com17/index.asp Identity Management web page - T/studygroups/com17/idm.html T/studygroups/com17/idm.html Join coordination activity for identity management

Top of the OID Tree itu-t(0) iso(1) joint-iso-itu-t(2) member-body(2) identified-organisation(3) root recommendation(0) Example: {joint-iso-itu-t(2) tag-based(27) mcode(1)} Note: The name of the 3 top-level arcs does not imply a hierarchical dependency to ISO or ITU-T. country(16) tag-based(27) ISO 3166 country codes ISO 6523 ICD codes 12

Some Advantages of using OID  Human-readable notation: {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1)}  Dot notation:  URN notation: urn:oid:  Internationalized notation (IRI): oid:/ISO/Member-Body/US/RSADSI/PKCS  Used in a lot of ISO standards, ITU-T Recommendations and IETF RFCs, but not only!  Very good take up: 120,000+ OIDs described at much more exist  Compact binary encoding (normally used in all computer communications)  Allows transmission over constrained networks 13

Challenge for OID Use of OIDs for the Internet of Things  ITU-T X.668 | ISO/IEC (2008) is a way to unify the many identification schemes used for the Internet of Things (RFID, bar codes, ISBN, etc.)  Does not cause existing tags to become obsolete  Use case example: a tag placed on a billboard poster can be read with a mobile phone and make it easy for the user to get additional multimedia (text, graphics, even voice or video) information about the content of the poster  Other use cases in Rec. ITU-T F