Download presentation
Presentation is loading. Please wait.
Published byLee Kelley Modified over 9 years ago
1
Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s. www.oasis-open.org
2
Motivation n Big ideas, current needs l Single European Information Space l Pan-European e-gov services l E-Government 2.0 n Current challenges l Lack of interoperability l Underestimated privacy threats l Unaccepted complexity by the end-user l Lack of personification n E-ID (authentication) is key enabler
3
New e-ID design n Searching of e-ID solution n Systematic analysis n Design from scratch l System design methodology was used l New way of thinking about e-ID l New principles, new methods n ALUCID ® - Anonymous, Liberal, and User-Centric electronic IDentity
4
Anonymous identity n Anonymous identity – Nonsense? n Real life examples of anonymous identity l Dog and its master l Mother and her baby l Program variable in virtual memory n ALUCID ® separates distinguishing between subjects from naming of subjects (claims) l Identifiers and credentials are very large random (or pseudorandom) numbers with limited validity in time. l Names (claims) can be protected application data
5
Open Standard Interfaces
6
Missing entities n No login names, no passwords. No forgotten password, no phished password, … n No user certificate. No recertification, no extra charges, no names on the network,… n No identity provider. No user communication with an identity provider, no personal information managed by third party, … n No government-issued identity. No “numbering” of citizens, no misuse of state- issued identifiers,… n No biometric data without access control. No cloned biometric data from e-ID use, no remote verification of biometric data origin,...
7
End-user n Extremely simple use – have a PEIG ® (Personal Electronic Identity Gadget) and activate/deactivate it. n User freedoms: l Selecting a product, producer, form, size, features,… l Selecting an activation method l No obligation to use that PEIG l Possibility to use more than one PEIG l Possibility to change his/her mind in future n Direct access to personified services n Service provider takes care of his/her security n Virtually private Internet (“My Internet”) n Universal use of PEIG
8
End-user point of view
9
End-User scenario n The user scenario should be: l The user selects a PEIG ®. It is sold empty. l The user teaches his or her PEIG to recognize him or her when activated. l The user connects the first time to the service provider and uses the activated PEIG. l The user can (but need not) give his or her personal data to the service provider l The user will be able to open his or her personified service directly if he or she activates his or her PEIG. l The same procedure can be used with any other service provider supporting ALUCID ®.
10
Prototype demo
11
Thank you for your attention n Libor.Neumann@anect.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.