Presentation is loading. Please wait.

Presentation is loading. Please wait.

Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s. www.oasis-open.org.

Similar presentations


Presentation on theme: "Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s. www.oasis-open.org."— Presentation transcript:

1 Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s. www.oasis-open.org

2 Motivation n Big ideas, current needs l Single European Information Space l Pan-European e-gov services l E-Government 2.0 n Current challenges l Lack of interoperability l Underestimated privacy threats l Unaccepted complexity by the end-user l Lack of personification n E-ID (authentication) is key enabler

3 New e-ID design n Searching of e-ID solution n Systematic analysis n Design from scratch l System design methodology was used l New way of thinking about e-ID l New principles, new methods n ALUCID ® - Anonymous, Liberal, and User-Centric electronic IDentity

4 Anonymous identity n Anonymous identity – Nonsense? n Real life examples of anonymous identity l Dog and its master l Mother and her baby l Program variable in virtual memory n ALUCID ® separates distinguishing between subjects from naming of subjects (claims) l Identifiers and credentials are very large random (or pseudorandom) numbers with limited validity in time. l Names (claims) can be protected application data

5 Open Standard Interfaces

6 Missing entities n No login names, no passwords. No forgotten password, no phished password, … n No user certificate. No recertification, no extra charges, no names on the network,… n No identity provider. No user communication with an identity provider, no personal information managed by third party, … n No government-issued identity. No “numbering” of citizens, no misuse of state- issued identifiers,… n No biometric data without access control. No cloned biometric data from e-ID use, no remote verification of biometric data origin,...

7 End-user n Extremely simple use – have a PEIG ® (Personal Electronic Identity Gadget) and activate/deactivate it. n User freedoms: l Selecting a product, producer, form, size, features,… l Selecting an activation method l No obligation to use that PEIG l Possibility to use more than one PEIG l Possibility to change his/her mind in future n Direct access to personified services n Service provider takes care of his/her security n Virtually private Internet (“My Internet”) n Universal use of PEIG

8 End-user point of view

9 End-User scenario n The user scenario should be: l The user selects a PEIG ®. It is sold empty. l The user teaches his or her PEIG to recognize him or her when activated. l The user connects the first time to the service provider and uses the activated PEIG. l The user can (but need not) give his or her personal data to the service provider l The user will be able to open his or her personified service directly if he or she activates his or her PEIG. l The same procedure can be used with any other service provider supporting ALUCID ®.

10 Prototype demo

11 Thank you for your attention n Libor.Neumann@anect.com


Download ppt "Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s. www.oasis-open.org."

Similar presentations


Ads by Google