SlideShare uma empresa Scribd logo
1 de 24
re-thinking identity – meeting public sector challenges




            what should the public sector
                     demand?
                                   Jerry Fishenden
                                  National Technology Officer
                                           Microsoft
                                    blog – http://ntouk.com
                               twitter – http://twitter.com/ntouk
realities of the threat landscape
• hackers
• crackers
• script kiddies …

• … and governments ….?
we need trust in our digital lives
        • any systems – private or public sector –
          need to:
           – recognise the importance of the rule of
             law, security, and privacy and other core
             democratic freedoms in contributing to
             trustworthiness
           – honour European values such as privacy,
             freedom of expression, protection of
             minorities, freedom of association, and
             freedom of belief
        • the public sector has a key role in
          overall governance and compliance in
          support of these important values
… not this …
… or this …
not a great model either …

                  your name, bank account
                  number, sort code number
                  … (conveniently embossed
                  for easy skimming)




     … your signature,                       234
     “security code” and
     “automated hacking
     magnetic strip”
improvements
so how about this?

paper world                          digital world




                                no need for this
                                vulnerability


         useful data … in the
         wrong hands
and this?
• enables users to
  use multiple
  identity systems
• based on Web
  services
• usable by any
  application
• strong 2-way
  authentication
• enhanced privacy
   – at user’s discretion,
     store personal
     information on
     PC/Phone/Device
     or in “the cloud”
   – fully informed
     disclosure
   – multiple personas,
     a mirror of the real
     world
so what should the public sector
          demand …?

        • not a 1940s-50s system based
          around identity cards
        • or a 1960s idea of computers
          sitting at the centre and seeing
          and knowing everything
           – (psst. government is no better at
             the centre of our lives than
             Microsoft Passport was …)
the public sector should demand …
         • a 21st century approach to identity
           with clear value and incentives for
           citizens, businesses and the public
           sector
         • proof of entitlement and authorisation
           to use a service, without necessarily
           identifying the user
            – that is, the disclosure of only the bare
              minimum of information necessary for a
              transaction:
               • for example, providing a proof that a person
                 is over or under a certain age threshold,
                 without disclosing their actual date of birth
                 or their age
• a choice of devices that makes sense
  not only to government, but also to
  us as citizens and to the commercial
  sector
• the effective management of
  electronic credentials throughout
  the lifecycle between issuance and
  revocation, in a privacy-friendly way
• decentralised governance of identity
  infrastructure across the private and
  public sectors, without the need or
  desire for anyone to sit in the
  middle and log and monitor
  everything we do in our daily lives
minimal disclosure tokens / U-Prove
minimal disclosure tokens: basics


Name:      Alice Smith                DOB:        03-25-1976
Name:      Alice Smith
Address:
Address:   1234 Crypto, Seattle, WA
           1234 Crypto, Seattle,      Reputation: high
Status:    gold customer
Status:    gold customer              Gender:     female
minimal disclosure tokens: basics


                                                      Which adult
                                    Prove that        from WA is
                                   you are from          this?
                                   WA and over
                                        21

                           ?                      ?

Name:    Alice Smith
Address: 1234 Crypto, Seattle, WA
         DOB:          03-25-1976 proof
                           Over-21
Status:  gold customer
         Reputation: high
         Gender:       female
authenticated anonymity
                          Prove that
                          you are a
                             gold
                          customer




Name:     Alice Smith
Address: 1234 Crypto, Seattle, WA
Status:   gold customer
unlinkable data sharing
   Name:    Alice Smith
   Address: 1234 Crypto, Seattle, WA
   Status:  gold customer




                            ?            UserID:
                                         City:
                                                   Alice S.
                                                   Seattle, WA
                                                          ?
                  No unwanted linkages




Name:     Alice Smith
           UserID: Alice S.
Address: 1234 Crypto, Seattle, WA
Status:   gold customer
… and at the macro level
    • fundamental reform of the
      policymaking process:
      – ensure technological and scientific
        evidence is gathered and understood
        prior to legislation being brought
        forward
         • eg avoid ‘the Identity Cards Act’ model,
           where the mechanism/solution (cards) is
           fused with the objective and policy
           outcome
    • don’t plan based on what you can
      see in the rear-view mirror
conclusion
• the public sector can help raise the game for
  everyone:
  – placing the citizen at the centre and in control (not at
    the centre under permanent and routine surveillance)
  – empowering the citizen with additional safeguards
    and protections well beyond those that the current
    plastic cards in our wallets and purses provide
  – acting as a catalyst to encourage the adoption of user-
    centric, not provider-centric, models
• hence helping ensure that a twenty-first
  identity framework …
  – underpins the rule of law, security, and privacy
    and other core democratic freedoms in
    contributing to trustworthiness
  – honours European values such as privacy, freedom
    of expression, protection of minorities, freedom of
    association, and freedom of belief
some links
• Kim Cameron’s blog
  http://www.identityblog.com/
• Stefan Brands’ work
  http://www.credentica.com/
• CardSpace http://msdn.microsoft.com/en-
  us/library/aa480189.aspx
• Trust in Digital Life http://trustindigitallife.eu
re-thinking identity – meeting public sector challenges




                                 thank you …

                                   Jerry Fishenden
                                  National Technology Officer
                                           Microsoft
                                    blog – http://ntouk.com
                               twitter – http://twitter.com/ntouk

Mais conteúdo relacionado

Mais procurados

Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts Timothy Holborn
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkDarren Kuropatwa
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
Legal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaLegal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaDayo Ogunyemi
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge bankingTimothy Holborn
 
NGI Mobile Identity Utility
NGI Mobile Identity UtilityNGI Mobile Identity Utility
NGI Mobile Identity UtilityDavid Birch
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
IoT... The mind of minds
IoT... The mind of mindsIoT... The mind of minds
IoT... The mind of mindsMalek Al Haddad
 

Mais procurados (19)

Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship Framework
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Legal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaLegal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas Africa
 
Basema aljaberi tra
Basema  aljaberi  traBasema  aljaberi  tra
Basema aljaberi tra
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
eGovernment in Belgium
eGovernment in Belgium eGovernment in Belgium
eGovernment in Belgium
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
E commerce
E commerceE commerce
E commerce
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge banking
 
NGI Mobile Identity Utility
NGI Mobile Identity UtilityNGI Mobile Identity Utility
NGI Mobile Identity Utility
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
IoT... The mind of minds
IoT... The mind of mindsIoT... The mind of minds
IoT... The mind of minds
 

Semelhante a What Should The Public Sector Demand Jerry Fishenden 15.05.2009

Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Juan Llanos
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...netwealthInvest
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyVladislav Solodkiy
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)Felipe Prado
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipSloane Joie Trugman
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)JISC.AM
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
 

Semelhante a What Should The Public Sector Demand Jerry Fishenden 15.05.2009 (20)

Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Govt2.0
Govt2.0Govt2.0
Govt2.0
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new money
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
 

Mais de Jerry Fishenden

2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impact2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impactJerry Fishenden
 
Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008Jerry Fishenden
 
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry FishendenInteractive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry FishendenJerry Fishenden
 
uk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principlesuk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principlesJerry Fishenden
 
Designing online social security for the future
Designing online social security for the futureDesigning online social security for the future
Designing online social security for the futureJerry Fishenden
 
Open Forum Summit June 2010
Open Forum Summit June 2010Open Forum Summit June 2010
Open Forum Summit June 2010Jerry Fishenden
 
The Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference AbridgedThe Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference AbridgedJerry Fishenden
 

Mais de Jerry Fishenden (7)

2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impact2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impact
 
Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008
 
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry FishendenInteractive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
 
uk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principlesuk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principles
 
Designing online social security for the future
Designing online social security for the futureDesigning online social security for the future
Designing online social security for the future
 
Open Forum Summit June 2010
Open Forum Summit June 2010Open Forum Summit June 2010
Open Forum Summit June 2010
 
The Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference AbridgedThe Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference Abridged
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

What Should The Public Sector Demand Jerry Fishenden 15.05.2009

  • 1. re-thinking identity – meeting public sector challenges what should the public sector demand? Jerry Fishenden National Technology Officer Microsoft blog – http://ntouk.com twitter – http://twitter.com/ntouk
  • 2. realities of the threat landscape • hackers • crackers • script kiddies … • … and governments ….?
  • 3. we need trust in our digital lives • any systems – private or public sector – need to: – recognise the importance of the rule of law, security, and privacy and other core democratic freedoms in contributing to trustworthiness – honour European values such as privacy, freedom of expression, protection of minorities, freedom of association, and freedom of belief • the public sector has a key role in overall governance and compliance in support of these important values
  • 6. not a great model either … your name, bank account number, sort code number … (conveniently embossed for easy skimming) … your signature, 234 “security code” and “automated hacking magnetic strip”
  • 8. so how about this? paper world digital world no need for this vulnerability useful data … in the wrong hands
  • 9. and this? • enables users to use multiple identity systems • based on Web services • usable by any application
  • 10. • strong 2-way authentication • enhanced privacy – at user’s discretion, store personal information on PC/Phone/Device or in “the cloud” – fully informed disclosure – multiple personas, a mirror of the real world
  • 11. so what should the public sector demand …? • not a 1940s-50s system based around identity cards • or a 1960s idea of computers sitting at the centre and seeing and knowing everything – (psst. government is no better at the centre of our lives than Microsoft Passport was …)
  • 12. the public sector should demand … • a 21st century approach to identity with clear value and incentives for citizens, businesses and the public sector • proof of entitlement and authorisation to use a service, without necessarily identifying the user – that is, the disclosure of only the bare minimum of information necessary for a transaction: • for example, providing a proof that a person is over or under a certain age threshold, without disclosing their actual date of birth or their age
  • 13. • a choice of devices that makes sense not only to government, but also to us as citizens and to the commercial sector • the effective management of electronic credentials throughout the lifecycle between issuance and revocation, in a privacy-friendly way • decentralised governance of identity infrastructure across the private and public sectors, without the need or desire for anyone to sit in the middle and log and monitor everything we do in our daily lives
  • 15. minimal disclosure tokens: basics Name: Alice Smith DOB: 03-25-1976 Name: Alice Smith Address: Address: 1234 Crypto, Seattle, WA 1234 Crypto, Seattle, Reputation: high Status: gold customer Status: gold customer Gender: female
  • 16. minimal disclosure tokens: basics Which adult Prove that from WA is you are from this? WA and over 21 ? ? Name: Alice Smith Address: 1234 Crypto, Seattle, WA DOB: 03-25-1976 proof Over-21 Status: gold customer Reputation: high Gender: female
  • 17. authenticated anonymity Prove that you are a gold customer Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer
  • 18. unlinkable data sharing Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer ? UserID: City: Alice S. Seattle, WA ? No unwanted linkages Name: Alice Smith UserID: Alice S. Address: 1234 Crypto, Seattle, WA Status: gold customer
  • 19.
  • 20. … and at the macro level • fundamental reform of the policymaking process: – ensure technological and scientific evidence is gathered and understood prior to legislation being brought forward • eg avoid ‘the Identity Cards Act’ model, where the mechanism/solution (cards) is fused with the objective and policy outcome • don’t plan based on what you can see in the rear-view mirror
  • 21. conclusion • the public sector can help raise the game for everyone: – placing the citizen at the centre and in control (not at the centre under permanent and routine surveillance) – empowering the citizen with additional safeguards and protections well beyond those that the current plastic cards in our wallets and purses provide – acting as a catalyst to encourage the adoption of user- centric, not provider-centric, models
  • 22. • hence helping ensure that a twenty-first identity framework … – underpins the rule of law, security, and privacy and other core democratic freedoms in contributing to trustworthiness – honours European values such as privacy, freedom of expression, protection of minorities, freedom of association, and freedom of belief
  • 23. some links • Kim Cameron’s blog http://www.identityblog.com/ • Stefan Brands’ work http://www.credentica.com/ • CardSpace http://msdn.microsoft.com/en- us/library/aa480189.aspx • Trust in Digital Life http://trustindigitallife.eu
  • 24. re-thinking identity – meeting public sector challenges thank you … Jerry Fishenden National Technology Officer Microsoft blog – http://ntouk.com twitter – http://twitter.com/ntouk