1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Information Society Technologies Programme Angelo Airaghi Finmeccanica - Senior Vice President Business Development ISTAG (IST Advisory Group) Role and.
Electronic Money (Micromoney) Luis Enrique Heredia Figueroa.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Secure Communication Architectures.
> A new vision of transport TECHNOLOGYMULTI-APPLICATIONSECONOMICSLICENSINGCNAIMPLEMENTATION GENERAL Designed and promoted by public transport operators.
Scenarios for Ambient Intelligence in 2010 K. Ducatel, M. Bogdanowicz, F. Scapolo, J.Leijten & J-C. Burgelman Presenter: Shuai Peng
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
A Context Framework for Ambient Intelligence. Context servers Motivation interoperable Machine processable Security & privacy.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Ajay Joshi. Function  Simple opening screen with large icons for each ‘grouping’ (Efficient)  Opens through a web browser (Efficient)  First time you.
Introduction to ubiquitous security Kevin Wang. Scenario Take photos Ask position Position voice Time More information.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Ministry of Transport, Information Technology and Communications Technological base: Interoperability Tsvetanka Kirilova Ministry of TITC Bulgaria.
AMBIENT INTELLIGENCE Presented by GOKUL SURESH. INTRODUCTION  Evolution of Ambient Intelligence.  Science with a fictional view.  Enriching environment.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Chapter 10: Authentication Guide to Computer Network Security.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Information Security for Managers (Master MIS)
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
The difference between a Credit and Debit Card Debit card: Give you access to your funds immediately Credit card: You use money you don’t have but are.
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003
BUSINESS B1 Information Security.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
DICOM and ISO/TC215 Hidenori Shinoda Charles Parisot.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Electronic Money. What is Electronic Money? Scrip or money that is exchanged only through electronically is referred to as electronic money. Electronic.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Access Control / Authenticity Michael Sheppard 11/10/10.
NEM – How to implement Convergence! SRA Presentation – Update May 2006
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
DIGITIZING OUR WALLETS Digital Wallets for E-Commerce Development.
Electronic Banking & Security Electronic Banking & Security.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
Unlinking Private Data
A Context Framework for Ambient Intelligence
Take Charge of your Finances
Identity on the Internet
Take Charge of your Finances
HIPAA & PHI TRAINING & AWARENESS
Take Charge of your Finances
E-identities (and e-signatures)
Colorado “Protections For Consumer Data Privacy” Law
New type of devices for identification of users of “Raiffeisen ONLINE” – Hardware and Software Tokens.
Presentation transcript:

1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre

2 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Summary  Ambient Intelligence (AmI) Environment  Identity in AmI Space  Scenario  Use Cases

3 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Ambient Intelligence Environment  Key technologies Ubiquitous Computing Ubiquitous Communication Intelligent user friendly Interfaces  Purpose Deliver seamless applications and services to citizens  User-driven approach Better integration of technology into our environment  Understand how people interact with technology  Indispensable component: user context  Characteristics to be achieved Ubiquity, awareness, transparency, intelligent, sensitive, adaptive and responsive Or how to enrich the quality of everyday life.

4 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Social Technologic Protection of personal data Common standards to permit interoperation Seamless communications infrastructure Use in a natural way Enhancing opportunities (dev. of app. & provision to market) Level of personal control over AmI Ambient Intelligence Environment Economic Legal Trusted network Some drivers for scenario development

5 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in AmI Space (1/2)  Identity information Offline Identity  Related to appearance (hair, eyes colour, glasses)  Social information (name, postal address, phone number)  Identity tokens (passport, visa, credit card, security social number, bank account number) Digital Identity  Related to appearance (biometrics template)  Social Information (nickname, address, IP address)  Identity tokens (digital signature, digital certificate ) Identity to bridge offline and digital Identities  Knowledge-based Identification (password, PIN)  Related to the user context (profile, user preferences)

6 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in AmI Space (2/2)  Identity information concerns Interoperability  Identity information should be understandable by any device Privacy  Identity information should be used by authorized devices  User should be able to control /specify which information to disclose and to whom Data protection Storage  Centralized or not

7 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Scenario: scene presentation -- Enjoy a bar in AmI space of the bar Electronic devices at both entrances Personal electronic devices Adaptive screen TV screen

8 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Schematic view of the scenario -- Enjoy a bar in Entry into the bar At the bar Chance encounter Payment

9 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Use case 1: in his/her city Entry into the bar At the bar Chance encounter Payment He declares his preferences and actives his availability to meet a friend Barman: do you want a cappuccino? (the favourite drink) The adaptive screen shows him the soft drinks. Thanks to his electronic devices he watches TV in the language of his choice (preference) An alarm notifies him a friend is coming in. He pays with fingerprint mode He pays with RFID card from local account. - favourite drink, etc. - user specificities: temporal medication - list of friends based of phone numbers - Seamless (T) - Standard (T) - Level of personal control (S) - Use in a natural way (S) - Protection of data (L) - Trust and market (E)

10 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Use case 2: foreign countries Entry into the bar At the bar Chance encounter Payment He declares his preferences. A temporal account is open. The adaptive screen automatically provides him the menu in his own language. After a drink and a reservation of this hotel through the wifi connection, he is more relaxed and actives his availability to meet a person putting his profile at disposal. An alarm notifies him two answers. He accepts one. His temporal account indicates the amount to be paid in both currencies with the conversion rate. - Seamless (T) - Standard (T) - Level of personal control (S) - Use in a natural way (S) - Protection of data (L) - Trust and market (E)

11 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Conclusion: analyse (1/3)  AmI characteristics Adaptive  Language, currency, soft drinks (medication taken into account) Easy to use  Biometrics Interoperability  Foreign countries Seamless  Wifi, RFID User-driven approach  Take into account profile, user preferences Identity in the AmI environment

12 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Conclusion: analyse (2/3)  Identity types Offline identity  Related to the appearance, finger (uc1)  Identity tokens, RFID card (uc1), credit card(uc2), BAN (uc1) Digital identity  Related to the appearance, fingerprint template(uc1)  Social information, ID of personal electronic device(uc1&2) Identity to bridge offline and digital Identities  Knowledge-based Identification, [password, PIN of personal electronic device(uc1&2)]  Related to the user context, profile, use preferences (uc1&2)  Identity concerns Privacy and control User decides to active or not his availability, what information is put at disposal, and knows (trusts) the scope of disclosure is inside the AmI bar Data protection Identity in the AmI environment

13 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the AmI environment Entry into the bar At the bar Chance encounter Payment He declares his preferences and actives his availability to meet a friend Barman: do you want a cappuccino? (the favourite drink) The adaptive screen shows him the soft drinks. Thanks to his electronic devices he watches TV in the language of his choice (preference) An alarm notifies him a friend is coming in. He pays with fingerprint mode He pays with RFID card from local account. 1 Profile representation  individual profile  preferences 2 Profile representation  individual profile  sociological profile  personal network 1 Identifier  biometrics  fingerprint 2 identifier  electronic device  id card / RFID 1 Identifier  electronic device (  PDA) 2 Profile representation  individual profile  preferences Identity / electronic device / access 1 Identity / data protection 2 Identity / storage / biometrics template Conclusion: analyse (3/3)

14 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Sabine Delaitre JRC, IPTS, ICT unit Thank you

15 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Use case 2: foreign countries Entry into the bar At the bar Chance encounter Payment He declares his preferences. A temporal account is open. The adaptive screen automatically provides him the menu in his own language. After a drink and a reservation of this hotel through the wifi connection, he is more relaxed and actives his availability to meet a person putting his profile at disposal. An alarm notifies him two answers. He accepts one. His temporal account indicates the amount to be paid in both currencies with the conversion rate. Analyse (4) Profile representation  individual profile  sociological profile /anonymous Profile representation  individual profile  preferences 1 Identity / electronic device / access 2 Identity / standardization