SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Competence Center ELAN                                                   Fraunhofer FOKUS




 Identity Management

 Workshop: Russian-German Centre for Interoperable eGovernment Systems
 Berlin,
 B li 10th J
           January 2011


 Petra Hoepner
Competence Center ELAN             Fraunhofer FOKUS

  Co cept o de t ty a age e t
  Concept of identity management
  Every person is many




                                                      2
Competence Center ELAN                          Fraunhofer FOKUS

  Co cept o de t ty a age e t
  Concept of identity management
  What is a digital identity?


     Statements about a person
     Long living identifier
        g      g
     Set of attributes that describe
     characteristics and permissions
     People ha e different digital identities
              have diffe ent
     for different purposes
     The particular relevant one is being
     used
     Usage requires that only the legitimate
     owner can use this identity




                                                                   3
Competence Center ELAN                                                         Fraunhofer FOKUS

  Co cept o de t ty a age e t
  Concept of identity management
  Vision: Citizens friendly identity management
    Every citizen has a digital identity with various attributes, that he can use to carry
         y                g            y                        ,                        y
    out interactions in the digital world.

    He is free to decide to whom he leaves which attributes of his digital identity and
    for how long. He trusts in that the recipient of this information, e.g. the service
    provider is authentic.

    The citi en is in cont ol of the flo of his pe sonal info mation - e en ac oss
        citizen       control        flow       personal information even across
    domains.

    If it is not necessary for the transaction to transmit personal attributes - he can
    refuse it.

    It is easy for the citizen to use his digital identity and to select the appropriate
    attributes for each transaction.




                                                                                                  4
Competence Center ELAN                                   Fraunhofer FOKUS


 Dimension of Identity Management
 Heterogenous Landscape
                                                  Email-Access    User name
                                                   via website
                                                    i    b it     Password
                                                                  Pass ord


                                                                  User name
                                                 Online-Banking   Password


                                                 eGovernment      User name
                                                   services       Password
                                    Biometrics
                                      IPSec       eCommerce       User name
                                                   services       Password


                                                                  User name
                                                   Workplace
                     Phishing                                     Password

                     Fraud
                                                                  User name
                     Trojans                        Private       Password

                     other
Competence Center ELAN                                        Fraunhofer FOKUS


 Identity Management Stakeholders
 Application and management of secure electronic identities
Competence Center ELAN                                                  Fraunhofer FOKUS


 Identity Functions and S i
 Id tit F     ti      d Services

      Identification/
       Registration/
       R i t ti /
                                         Secure Identity Management comprises:
     at identity provider
     or service provider
                                           Identification and Registration of users

      Authentication                       Authentication of users, i.e. transmit and verify
          „Login“ –                        identities (who am I?)
     Services, Websites,


                            Man
        Communities                        Authorization of users for specific access (what

                              nagement
                                           am I allowed to do?)

       Authorization                       Monitoring und Auditing of usage
       Roles and rights                    Management of user id titi
                                           M          t f        identities, roles and rights
                                                                               l     d i ht
     Allow / deny access                   (management of life cycle, sessions and security
                                           context)

  Monitoring and Auditing
     Evidence of usage
Competence Center ELAN                                                                  Fraunhofer FOKUS


 Evolution of Identity Management




                                                                                         Identity
                                                                                         Convergence
                                                                     User centric
                                                                     Identity            Trust and
                                                                                         interoperability of
                                               Federated Id
                                               F d   t d             User-centric
                                                                     User centric and    various identity
                                                                                            i    id tit
                                                                     service-centric     solutions and
                                               Architectural         identities match
                                               approach: Identity                        services
                                               as a set of
                         SingleSignOn
                            g    g             attributes; Sharing
                                               of service-centric
                         Single user-centric
                                               IDs
                         ID paired with
             Username    many service-
             Password    centric IDs
Competence Center ELAN                                 Fraunhofer FOKUS


 Secure eIdentity Laboratory
        eIdentity-Laboratory
 Cooperation of Fraunhofer FOKUS and the Bundesdruckerei



 Goals:
    Provision of a process- and service
    oriented architecture for identity-related
    information.
     Integration of various eIdentity
     technologies and solutions
     Platform a d a showcase for secu e
       at o     and s o case o secure
     digital identities in innovative
     application scenarios
Competence Center ELAN   Fraunhofer FOKUS

  The New Ge a ID Ca d
    e e German    Card




                                            10
Competence Center ELAN                                        Fraunhofer FOKUS

  The New Ge a ID Ca d
     e e German        Card
  Electronic functions
                                                   online ID function


    new ID card was launched in
    Germany on 1 November 2010




                                     Sovereign ID function / optionally stored on chip




    It combines the traditional ID           qualified electronic signature (QES)
    card with th
        d ith three new electronic
                           l t i
    functions




                                                                                         11
Competence Center ELAN                                                     Fraunhofer FOKUS


 The German eID
 Innovation – Mutual identification

    The Service Provider has to register with a German authority to access the German eID card
    and its attributes like name, address and age.




           Citizen              Service Provider identifies itself     Service
                                With an authorization ce t cate
                                   t a aut o at o certificate         Provider
                                 Citizen as well as the SP are
                                trustworthy player within the
                                   German eID framework
                                   G         ID f          k
          Is the service
             provider                                                Does the person
                                    Citizen identifies herself
          trustworthy?                                                 really exist?
                                        with German eID
Competence Center ELAN                                                                         Fraunhofer FOKUS


 Authentication ith
 A thentication with the Ge man eID ca d
                         German     card


                                                                       Service Provider


                                                                                   Transfer ID-data
                    User authenticated          1                             7
                                                                                   to service provider
                                                Access Web site
                                        8
                                                                     Redirect to 2
                                                            eID-service provider
                                 4                     Chip- and Terminal-
                                                        h      d        l
    Citizen                                            Authentication
                                                   3
     Display
4                                                                            6
     forms
                                                                  Transfer ID d
                                                                  T    f ID-data
     First name
     Last name                              5                                            eID-Service
                                            Co
                                            Confirm ID-
     Age          or:
                  ID-secret + service       data with PIN
                                                                                         Provider
     ...          provider number
                  = Pseudonym
Competence Center ELAN                                    Fraunhofer FOKUS


 Innovative applications – Identity of person and car
 Car re-registration with the new German eID card and a future
 automotive card

    Car re-registration incorporating the
    eID card and an e-paper based
    automotive card
Competence Center ELAN                                      Fraunhofer FOKUS


 Identity and Privacy
 myID.privat: Privacy based on trusted combination of identity attributes
    Privacy and data security become more
    important in the virtual world
    Vision: anonymity and pseudonymity are
    possible with trusted electronic identities
    Design of an infrastructure supporting
    privacy of personal data
    Analysis and development of technologies
    for the combination of attributes
    Implementation of privacy-supporting
    scenarios
    Integration of the new German identity
    card
Competence Center ELAN                                                  Fraunhofer FOKUS


 Secure Id titi in the cloud
 S      Identities i th l d
                                                           eGovernment Services
 Secure authentication and
 access using the identity             Social Networks
 card to built trust between
 provider and user of
 services                         eBusiness Services
                                                       On
                                                        Identity/Attribute Provider

                                       eSafe

                                                 Secure Identity
                                                 in the Cloud



                               Secure Authentication and Access


   New German eID card
Competence Center ELAN           Fraunhofer FOKUS


Challenges in clouds
Ch ll      i l d
Trust Relations




                         TRUST
Competence Center ELAN                                                           Fraunhofer FOKUS


 Challenges in clouds
 Ch ll      i l d
 Identity services

 Identification, User Provisioning
     Single user or bulk provisioning, types of users, rapid turnaround
 Authentication
     Secure authentication of internal privileged users (e.g. IT personnel)
     Secure authentication of external users (e.g. citizen, business users)
     Built-in
     B ilt i mechanisms or id tit management services
                h i        identity        t     i
     Federated identities, single-sign-on, user-centric approaches, delegation of identity
 Access control
     Authorization and access based on user credentials (user profiles, roles)
     Authorization policy handling, authorization decisions, access control model
        g
 Auditing
     Provision of audit logs, liability
 Privacy
     Identity attributes data documents service usage
              attributes, data, documents,
Competence Center ELAN                                      Fraunhofer FOKUS

  Missions for identity management
    ss o s o de t ty a age e t
  Secure eIdentity: Important Steps

    Development of future-oriented and
    secure solutions for complex identities in
    the virtual world in conjunction with the
    new ID card
    Promote the secure and seamless media
    communication among heterogeneous
    systems based on standardized
     y
    procedures / protocols
    Cross-border interoperability
    Contextual use of identity attributes
    Privacy-supporting technologies
    Combining various industry approaches,
    standards and solutions


     Modern industry states need an IT-infrastructure capable of managing
                         securely electronic id titi
                               l l t      i identities

                                                                               19
Competence Center ELAN                     Fraunhofer FOKUS




Petra H
P t Hoepner

Fraunhofer FOKUS
Research Group eIdentity
Kaiserin-Augusta-Allee 31, 10589 Berlin,
Germany y

Tel +49 (30) 3463 7185
Fax +49 (30) 3463 8000

Internet: www.fokus.fraunhofer.de
Email: petra hoepner@fokus fraunhofer de
       petra.hoepner@fokus.fraunhofer.de

Más contenido relacionado

La actualidad más candente

SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationVCW Security Ltd
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd Iaetsd
 
Trend One (Web Expansion) Grape Online Strategies 2009 by Nick Sohnemann
Trend One (Web Expansion) Grape Online Strategies 2009 by Nick SohnemannTrend One (Web Expansion) Grape Online Strategies 2009 by Nick Sohnemann
Trend One (Web Expansion) Grape Online Strategies 2009 by Nick SohnemannHUNGRY BOYS Creative agency
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...IJERA Editor
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfStephen Rappaport
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiquestioninginstitute
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online servicesAtos_Worldline
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET Journal
 
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...Jorgen Thelin
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationNovell
 
Brightline interactive social machines 2013 tour
Brightline interactive social machines 2013 tourBrightline interactive social machines 2013 tour
Brightline interactive social machines 2013 tourJason Solomonson
 
Techniques to personalize conversations for virtual assistants
Techniques to personalize conversations for virtual assistantsTechniques to personalize conversations for virtual assistants
Techniques to personalize conversations for virtual assistantsJagadish Nomula
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hatgopikurup
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...Arab Federation for Digital Economy
 

La actualidad más candente (20)

SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
 
Trend One (Web Expansion) Grape Online Strategies 2009 by Nick Sohnemann
Trend One (Web Expansion) Grape Online Strategies 2009 by Nick SohnemannTrend One (Web Expansion) Grape Online Strategies 2009 by Nick Sohnemann
Trend One (Web Expansion) Grape Online Strategies 2009 by Nick Sohnemann
 
Mental Models of Employment
Mental Models of EmploymentMental Models of Employment
Mental Models of Employment
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
 
The Web Expansion
The Web ExpansionThe Web Expansion
The Web Expansion
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arf
 
Social media ethics and concerns
Social media ethics and concernsSocial media ethics and concerns
Social media ethics and concerns
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qi
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online services
 
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
IRJET- E-Grievance: Centralized System for Municipal Corporation to Citizens ...
 
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Week3 lecture
Week3 lectureWeek3 lecture
Week3 lecture
 
The Development of a Federal Digital Identity
The Development of a Federal Digital IdentityThe Development of a Federal Digital Identity
The Development of a Federal Digital Identity
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
 
Brightline interactive social machines 2013 tour
Brightline interactive social machines 2013 tourBrightline interactive social machines 2013 tour
Brightline interactive social machines 2013 tour
 
Techniques to personalize conversations for virtual assistants
Techniques to personalize conversations for virtual assistantsTechniques to personalize conversations for virtual assistants
Techniques to personalize conversations for virtual assistants
 
My PC Mistook Me For A Hat
My PC Mistook Me For A HatMy PC Mistook Me For A Hat
My PC Mistook Me For A Hat
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 

Similar a Идентификация - Identity Management (Германия - Fraunhofer FOKUS 2011)

Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoftbernardgolden
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application DevelopersWSO2
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital youTony Fish
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinForgeRock
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3Michael Queralt
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudCA API Management
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 

Similar a Идентификация - Identity Management (Германия - Fraunhofer FOKUS 2011) (20)

Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital you
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
Finger print
Finger printFinger print
Finger print
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
Usher overview.2014.02 hi
Usher overview.2014.02 hiUsher overview.2014.02 hi
Usher overview.2014.02 hi
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 

Más de Victor Gridnev

Цифровая повестка ЕАЭС 2016-2020
Цифровая повестка ЕАЭС 2016-2020Цифровая повестка ЕАЭС 2016-2020
Цифровая повестка ЕАЭС 2016-2020Victor Gridnev
 
Программа "Цифровая экономика Российской Федерации" 2017 год
Программа "Цифровая экономика Российской Федерации" 2017 годПрограмма "Цифровая экономика Российской Федерации" 2017 год
Программа "Цифровая экономика Российской Федерации" 2017 годVictor Gridnev
 
Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...
Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...
Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...Victor Gridnev
 
Гриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdf
Гриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdfГриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdf
Гриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdfVictor Gridnev
 
Отчет "Римского клуба" за 50 лет существования и прогнозы развития
Отчет "Римского клуба" за 50 лет существования и прогнозы развития Отчет "Римского клуба" за 50 лет существования и прогнозы развития
Отчет "Римского клуба" за 50 лет существования и прогнозы развития Victor Gridnev
 
E government survey 2018 final for web
E government survey 2018 final for webE government survey 2018 final for web
E government survey 2018 final for webVictor Gridnev
 
ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018
ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018
ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018Victor Gridnev
 
Модель данных ЕАЭС v4_7 02_02_2018 Datamodel
Модель данных ЕАЭС  v4_7 02_02_2018 DatamodelМодель данных ЕАЭС  v4_7 02_02_2018 Datamodel
Модель данных ЕАЭС v4_7 02_02_2018 DatamodelVictor Gridnev
 
ЦСР про реформу госуправления 2018 gosupravlnie web
ЦСР про реформу госуправления 2018 gosupravlnie webЦСР про реформу госуправления 2018 gosupravlnie web
ЦСР про реформу госуправления 2018 gosupravlnie webVictor Gridnev
 
план мероприятий по направлению информационная безопасность» программы цэ
план мероприятий по направлению информационная безопасность» программы  цэплан мероприятий по направлению информационная безопасность» программы  цэ
план мероприятий по направлению информационная безопасность» программы цэVictor Gridnev
 
план мероприятий по направлению формирование исследовательских компетенций и ...
план мероприятий по направлению формирование исследовательских компетенций и ...план мероприятий по направлению формирование исследовательских компетенций и ...
план мероприятий по направлению формирование исследовательских компетенций и ...Victor Gridnev
 
план мероприятий по направлению «Нормативное регулирование» программы «Цифров...
план мероприятий по направлению «Нормативное регулирование» программы «Цифров...план мероприятий по направлению «Нормативное регулирование» программы «Цифров...
план мероприятий по направлению «Нормативное регулирование» программы «Цифров...Victor Gridnev
 
план мероприятий по направлению информационная инфраструктура программы цэ
план мероприятий по направлению информационная инфраструктура программы цэплан мероприятий по направлению информационная инфраструктура программы цэ
план мероприятий по направлению информационная инфраструктура программы цэVictor Gridnev
 
ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...
ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...
ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...Victor Gridnev
 
Цифровая повестка ЕЭК от ВБ Обзор
Цифровая повестка ЕЭК от ВБ ОбзорЦифровая повестка ЕЭК от ВБ Обзор
Цифровая повестка ЕЭК от ВБ ОбзорVictor Gridnev
 
Сколково про ЦИфровую экономику Sk de web_17_oct
Сколково про ЦИфровую экономику Sk de web_17_octСколково про ЦИфровую экономику Sk de web_17_oct
Сколково про ЦИфровую экономику Sk de web_17_octVictor Gridnev
 
Доклад Skolkovo как поминать цифровую трансформацию
Доклад Skolkovo как поминать цифровую трансформациюДоклад Skolkovo как поминать цифровую трансформацию
Доклад Skolkovo как поминать цифровую трансформациюVictor Gridnev
 
Skolkovo Доклад про цифровое производство
Skolkovo Доклад про цифровое производство Skolkovo Доклад про цифровое производство
Skolkovo Доклад про цифровое производство Victor Gridnev
 
Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017Victor Gridnev
 
Про IoT Gartner i2017
Про IoT Gartner i2017Про IoT Gartner i2017
Про IoT Gartner i2017Victor Gridnev
 

Más de Victor Gridnev (20)

Цифровая повестка ЕАЭС 2016-2020
Цифровая повестка ЕАЭС 2016-2020Цифровая повестка ЕАЭС 2016-2020
Цифровая повестка ЕАЭС 2016-2020
 
Программа "Цифровая экономика Российской Федерации" 2017 год
Программа "Цифровая экономика Российской Федерации" 2017 годПрограмма "Цифровая экономика Российской Федерации" 2017 год
Программа "Цифровая экономика Российской Федерации" 2017 год
 
Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...
Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...
Гриднев В_ Презентация по подходам к проектному управлению цифровой трансформ...
 
Гриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdf
Гриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdfГриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdf
Гриднев ЕЭК Презентация по реализации цифровых инициатив ЕАЭС 05_2018.pdf
 
Отчет "Римского клуба" за 50 лет существования и прогнозы развития
Отчет "Римского клуба" за 50 лет существования и прогнозы развития Отчет "Римского клуба" за 50 лет существования и прогнозы развития
Отчет "Римского клуба" за 50 лет существования и прогнозы развития
 
E government survey 2018 final for web
E government survey 2018 final for webE government survey 2018 final for web
E government survey 2018 final for web
 
ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018
ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018
ЕЭК_Гриднев_В_В_презентация по реализации цифровых инициатив ЕАЭС v8_1 05_2018
 
Модель данных ЕАЭС v4_7 02_02_2018 Datamodel
Модель данных ЕАЭС  v4_7 02_02_2018 DatamodelМодель данных ЕАЭС  v4_7 02_02_2018 Datamodel
Модель данных ЕАЭС v4_7 02_02_2018 Datamodel
 
ЦСР про реформу госуправления 2018 gosupravlnie web
ЦСР про реформу госуправления 2018 gosupravlnie webЦСР про реформу госуправления 2018 gosupravlnie web
ЦСР про реформу госуправления 2018 gosupravlnie web
 
план мероприятий по направлению информационная безопасность» программы цэ
план мероприятий по направлению информационная безопасность» программы  цэплан мероприятий по направлению информационная безопасность» программы  цэ
план мероприятий по направлению информационная безопасность» программы цэ
 
план мероприятий по направлению формирование исследовательских компетенций и ...
план мероприятий по направлению формирование исследовательских компетенций и ...план мероприятий по направлению формирование исследовательских компетенций и ...
план мероприятий по направлению формирование исследовательских компетенций и ...
 
план мероприятий по направлению «Нормативное регулирование» программы «Цифров...
план мероприятий по направлению «Нормативное регулирование» программы «Цифров...план мероприятий по направлению «Нормативное регулирование» программы «Цифров...
план мероприятий по направлению «Нормативное регулирование» программы «Цифров...
 
план мероприятий по направлению информационная инфраструктура программы цэ
план мероприятий по направлению информационная инфраструктура программы цэплан мероприятий по направлению информационная инфраструктура программы цэ
план мероприятий по направлению информационная инфраструктура программы цэ
 
ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...
ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...
ЕЭК 26_122017 Об утверждении Положения о модели данных Евразийского экономиче...
 
Цифровая повестка ЕЭК от ВБ Обзор
Цифровая повестка ЕЭК от ВБ ОбзорЦифровая повестка ЕЭК от ВБ Обзор
Цифровая повестка ЕЭК от ВБ Обзор
 
Сколково про ЦИфровую экономику Sk de web_17_oct
Сколково про ЦИфровую экономику Sk de web_17_octСколково про ЦИфровую экономику Sk de web_17_oct
Сколково про ЦИфровую экономику Sk de web_17_oct
 
Доклад Skolkovo как поминать цифровую трансформацию
Доклад Skolkovo как поминать цифровую трансформациюДоклад Skolkovo как поминать цифровую трансформацию
Доклад Skolkovo как поминать цифровую трансформацию
 
Skolkovo Доклад про цифровое производство
Skolkovo Доклад про цифровое производство Skolkovo Доклад про цифровое производство
Skolkovo Доклад про цифровое производство
 
Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017Deloitte принципы blockchai 2017
Deloitte принципы blockchai 2017
 
Про IoT Gartner i2017
Про IoT Gartner i2017Про IoT Gartner i2017
Про IoT Gartner i2017
 

Último

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Идентификация - Identity Management (Германия - Fraunhofer FOKUS 2011)

  • 1. Competence Center ELAN Fraunhofer FOKUS Identity Management Workshop: Russian-German Centre for Interoperable eGovernment Systems Berlin, B li 10th J January 2011 Petra Hoepner
  • 2. Competence Center ELAN Fraunhofer FOKUS Co cept o de t ty a age e t Concept of identity management Every person is many 2
  • 3. Competence Center ELAN Fraunhofer FOKUS Co cept o de t ty a age e t Concept of identity management What is a digital identity? Statements about a person Long living identifier g g Set of attributes that describe characteristics and permissions People ha e different digital identities have diffe ent for different purposes The particular relevant one is being used Usage requires that only the legitimate owner can use this identity 3
  • 4. Competence Center ELAN Fraunhofer FOKUS Co cept o de t ty a age e t Concept of identity management Vision: Citizens friendly identity management Every citizen has a digital identity with various attributes, that he can use to carry y g y , y out interactions in the digital world. He is free to decide to whom he leaves which attributes of his digital identity and for how long. He trusts in that the recipient of this information, e.g. the service provider is authentic. The citi en is in cont ol of the flo of his pe sonal info mation - e en ac oss citizen control flow personal information even across domains. If it is not necessary for the transaction to transmit personal attributes - he can refuse it. It is easy for the citizen to use his digital identity and to select the appropriate attributes for each transaction. 4
  • 5. Competence Center ELAN Fraunhofer FOKUS Dimension of Identity Management Heterogenous Landscape Email-Access User name via website i b it Password Pass ord User name Online-Banking Password eGovernment User name services Password Biometrics IPSec eCommerce User name services Password User name Workplace Phishing Password Fraud User name Trojans Private Password other
  • 6. Competence Center ELAN Fraunhofer FOKUS Identity Management Stakeholders Application and management of secure electronic identities
  • 7. Competence Center ELAN Fraunhofer FOKUS Identity Functions and S i Id tit F ti d Services Identification/ Registration/ R i t ti / Secure Identity Management comprises: at identity provider or service provider Identification and Registration of users Authentication Authentication of users, i.e. transmit and verify „Login“ – identities (who am I?) Services, Websites, Man Communities Authorization of users for specific access (what nagement am I allowed to do?) Authorization Monitoring und Auditing of usage Roles and rights Management of user id titi M t f identities, roles and rights l d i ht Allow / deny access (management of life cycle, sessions and security context) Monitoring and Auditing Evidence of usage
  • 8. Competence Center ELAN Fraunhofer FOKUS Evolution of Identity Management Identity Convergence User centric Identity Trust and interoperability of Federated Id F d t d User-centric User centric and various identity i id tit service-centric solutions and Architectural identities match approach: Identity services as a set of SingleSignOn g g attributes; Sharing of service-centric Single user-centric IDs ID paired with Username many service- Password centric IDs
  • 9. Competence Center ELAN Fraunhofer FOKUS Secure eIdentity Laboratory eIdentity-Laboratory Cooperation of Fraunhofer FOKUS and the Bundesdruckerei Goals: Provision of a process- and service oriented architecture for identity-related information. Integration of various eIdentity technologies and solutions Platform a d a showcase for secu e at o and s o case o secure digital identities in innovative application scenarios
  • 10. Competence Center ELAN Fraunhofer FOKUS The New Ge a ID Ca d e e German Card 10
  • 11. Competence Center ELAN Fraunhofer FOKUS The New Ge a ID Ca d e e German Card Electronic functions online ID function new ID card was launched in Germany on 1 November 2010 Sovereign ID function / optionally stored on chip It combines the traditional ID qualified electronic signature (QES) card with th d ith three new electronic l t i functions 11
  • 12. Competence Center ELAN Fraunhofer FOKUS The German eID Innovation – Mutual identification The Service Provider has to register with a German authority to access the German eID card and its attributes like name, address and age. Citizen Service Provider identifies itself Service With an authorization ce t cate t a aut o at o certificate Provider Citizen as well as the SP are trustworthy player within the German eID framework G ID f k Is the service provider Does the person Citizen identifies herself trustworthy? really exist? with German eID
  • 13. Competence Center ELAN Fraunhofer FOKUS Authentication ith A thentication with the Ge man eID ca d German card Service Provider Transfer ID-data User authenticated 1 7 to service provider Access Web site 8 Redirect to 2 eID-service provider 4 Chip- and Terminal- h d l Citizen Authentication 3 Display 4 6 forms Transfer ID d T f ID-data First name Last name 5 eID-Service Co Confirm ID- Age or: ID-secret + service data with PIN Provider ... provider number = Pseudonym
  • 14. Competence Center ELAN Fraunhofer FOKUS Innovative applications – Identity of person and car Car re-registration with the new German eID card and a future automotive card Car re-registration incorporating the eID card and an e-paper based automotive card
  • 15. Competence Center ELAN Fraunhofer FOKUS Identity and Privacy myID.privat: Privacy based on trusted combination of identity attributes Privacy and data security become more important in the virtual world Vision: anonymity and pseudonymity are possible with trusted electronic identities Design of an infrastructure supporting privacy of personal data Analysis and development of technologies for the combination of attributes Implementation of privacy-supporting scenarios Integration of the new German identity card
  • 16. Competence Center ELAN Fraunhofer FOKUS Secure Id titi in the cloud S Identities i th l d eGovernment Services Secure authentication and access using the identity Social Networks card to built trust between provider and user of services eBusiness Services On Identity/Attribute Provider eSafe Secure Identity in the Cloud Secure Authentication and Access New German eID card
  • 17. Competence Center ELAN Fraunhofer FOKUS Challenges in clouds Ch ll i l d Trust Relations TRUST
  • 18. Competence Center ELAN Fraunhofer FOKUS Challenges in clouds Ch ll i l d Identity services Identification, User Provisioning Single user or bulk provisioning, types of users, rapid turnaround Authentication Secure authentication of internal privileged users (e.g. IT personnel) Secure authentication of external users (e.g. citizen, business users) Built-in B ilt i mechanisms or id tit management services h i identity t i Federated identities, single-sign-on, user-centric approaches, delegation of identity Access control Authorization and access based on user credentials (user profiles, roles) Authorization policy handling, authorization decisions, access control model g Auditing Provision of audit logs, liability Privacy Identity attributes data documents service usage attributes, data, documents,
  • 19. Competence Center ELAN Fraunhofer FOKUS Missions for identity management ss o s o de t ty a age e t Secure eIdentity: Important Steps Development of future-oriented and secure solutions for complex identities in the virtual world in conjunction with the new ID card Promote the secure and seamless media communication among heterogeneous systems based on standardized y procedures / protocols Cross-border interoperability Contextual use of identity attributes Privacy-supporting technologies Combining various industry approaches, standards and solutions Modern industry states need an IT-infrastructure capable of managing securely electronic id titi l l t i identities 19
  • 20. Competence Center ELAN Fraunhofer FOKUS Petra H P t Hoepner Fraunhofer FOKUS Research Group eIdentity Kaiserin-Augusta-Allee 31, 10589 Berlin, Germany y Tel +49 (30) 3463 7185 Fax +49 (30) 3463 8000 Internet: www.fokus.fraunhofer.de Email: petra hoepner@fokus fraunhofer de petra.hoepner@fokus.fraunhofer.de