SlideShare a Scribd company logo
1 of 33
From Information Cards  to Relationship Cards  IIW IX November 3, 2009 Paul Trevithick, paul@azigo.com
The Problem ,[object Object],[object Object],[object Object],[object Object],[object Object]
Missing Identity Layer ,[object Object],[object Object],[object Object],[object Object],Identity Layer
Higgins  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Card Metaphor ,[object Object],[object Object]
Act I:  Regular Information Cards
Information Cards & Claims Data Portability:  profile & social networking attributes are made portable by referencing them on Information Cards Any kind of information: your preferences, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id, etc., can be on a card. Cards from multiple sites are managed in a local  Card Selector  application (Microsoft CardSpace™ or Azigo™ or Novell DigitalMe™)
Card-based Login Click Higgins is interoperable with Microsoft CardSpace™ shown here
Card Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Actors A U r P p Identity Provider Relying Party User R
Personal Card A U r P p R Personal Card has
Personal Card: Data Flow A U r P p R Personal Card
Managed Card A U r P p R points to token generator Managed Card has
Managed Card:  Data Flow A U r P p R points to token generator Managed Card has
Managed Card: Alice goes to site A U r P p R
Managed Card:  Selector retrieves policy A U r P p R Required and Optional  Claims
Managed Card:  Display cards that match policy A U r P p R
Managed Card:  Alice selects a card A U r P p R
Managed Card:  Auth to IdP A U r P p R
Managed Card:  Generate token A U r P p R
Managed Card:  Browser sends token A U r P p R Set of Claims
Managed Card:  Validate token A U r P p R
Managed Card:  Alice accesses resource A U r P p R
Card-based Login Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object]
Regular Cards ,[object Object],[object Object],[object Object],[object Object]
Act II:  Relationship Cards
Personal Data Agent ,[object Object],[object Object],Personal Data Agent Browser  Add-on Permissioned data sharing
Relationship Cards:  Sending a pointer claim value over the front channel A U r P p R Set of Claims  & Ptr
Personal  Relationship Cards:  Sending a pointer over the front channel A U r P p R Set of Claims  & Ptr Personal R-Card points to data has
Personal  Relationship Cards:  User managed data channel A U r P p R Any protocol
Managed Relationship Cards:  Sending a pointer over the front channel A U r P p R Set of Claims  & Ptr has Managed R-Card
Managed Relationship Cards:  User managed data channel A U r P p R Managed R-Card has Kantara UMA Access Manager control control control Any protocol
Relationship Cards ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Communication and identity
Communication and identityCommunication and identity
Communication and identity
sanjay singh
 

Viewers also liked (14)

Evolution of Internet Identity
Evolution of Internet IdentityEvolution of Internet Identity
Evolution of Internet Identity
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Language and the Internet - Netspeak - Finding Identity
Language and the Internet - Netspeak - Finding Identity Language and the Internet - Netspeak - Finding Identity
Language and the Internet - Netspeak - Finding Identity
 
Communication and identity
Communication and identityCommunication and identity
Communication and identity
 
Identity, the Internet of Things and the Blockchain
Identity, the Internet of Things and the Blockchain Identity, the Internet of Things and the Blockchain
Identity, the Internet of Things and the Blockchain
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
The Evolution of Internet Identity
The Evolution of Internet IdentityThe Evolution of Internet Identity
The Evolution of Internet Identity
 
Digital Identity & Social Media
Digital Identity & Social MediaDigital Identity & Social Media
Digital Identity & Social Media
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Social media honeycomb slideshare
Social media honeycomb slideshareSocial media honeycomb slideshare
Social media honeycomb slideshare
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
A2 Media Studies Booklet 2015
A2 Media Studies Booklet 2015A2 Media Studies Booklet 2015
A2 Media Studies Booklet 2015
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
The Real Life Social Network v2
The Real Life Social Network v2The Real Life Social Network v2
The Real Life Social Network v2
 

Similar to Relationship Cards Iiw Nov 3 2009

Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 
CMC - RIES-improvements: Pragmatic authentication
CMC - RIES-improvements: Pragmatic authenticationCMC - RIES-improvements: Pragmatic authentication
CMC - RIES-improvements: Pragmatic authentication
Martin Majlis
 
Spotlight_Biometrics_ForeignBiometricSurge
Spotlight_Biometrics_ForeignBiometricSurgeSpotlight_Biometrics_ForeignBiometricSurge
Spotlight_Biometrics_ForeignBiometricSurge
Catherine Moji Renner
 

Similar to Relationship Cards Iiw Nov 3 2009 (20)

Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Survey
 
Digital Identity:Threats and Prevention
Digital Identity:Threats and PreventionDigital Identity:Threats and Prevention
Digital Identity:Threats and Prevention
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
E-Business security
E-Business security E-Business security
E-Business security
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
Managing privacy
Managing privacyManaging privacy
Managing privacy
 
CMC - RIES-improvements: Pragmatic authentication
CMC - RIES-improvements: Pragmatic authenticationCMC - RIES-improvements: Pragmatic authentication
CMC - RIES-improvements: Pragmatic authentication
 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
 
Spotlight_Biometrics_ForeignBiometricSurge
Spotlight_Biometrics_ForeignBiometricSurgeSpotlight_Biometrics_ForeignBiometricSurge
Spotlight_Biometrics_ForeignBiometricSurge
 
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Relationship Cards Iiw Nov 3 2009

  • 1. From Information Cards to Relationship Cards IIW IX November 3, 2009 Paul Trevithick, paul@azigo.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Act I: Regular Information Cards
  • 7. Information Cards & Claims Data Portability: profile & social networking attributes are made portable by referencing them on Information Cards Any kind of information: your preferences, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id, etc., can be on a card. Cards from multiple sites are managed in a local Card Selector application (Microsoft CardSpace™ or Azigo™ or Novell DigitalMe™)
  • 8. Card-based Login Click Higgins is interoperable with Microsoft CardSpace™ shown here
  • 9.
  • 10. Actors A U r P p Identity Provider Relying Party User R
  • 11. Personal Card A U r P p R Personal Card has
  • 12. Personal Card: Data Flow A U r P p R Personal Card
  • 13. Managed Card A U r P p R points to token generator Managed Card has
  • 14. Managed Card: Data Flow A U r P p R points to token generator Managed Card has
  • 15. Managed Card: Alice goes to site A U r P p R
  • 16. Managed Card: Selector retrieves policy A U r P p R Required and Optional Claims
  • 17. Managed Card: Display cards that match policy A U r P p R
  • 18. Managed Card: Alice selects a card A U r P p R
  • 19. Managed Card: Auth to IdP A U r P p R
  • 20. Managed Card: Generate token A U r P p R
  • 21. Managed Card: Browser sends token A U r P p R Set of Claims
  • 22. Managed Card: Validate token A U r P p R
  • 23. Managed Card: Alice accesses resource A U r P p R
  • 24.
  • 25.
  • 26. Act II: Relationship Cards
  • 27.
  • 28. Relationship Cards: Sending a pointer claim value over the front channel A U r P p R Set of Claims & Ptr
  • 29. Personal Relationship Cards: Sending a pointer over the front channel A U r P p R Set of Claims & Ptr Personal R-Card points to data has
  • 30. Personal Relationship Cards: User managed data channel A U r P p R Any protocol
  • 31. Managed Relationship Cards: Sending a pointer over the front channel A U r P p R Set of Claims & Ptr has Managed R-Card
  • 32. Managed Relationship Cards: User managed data channel A U r P p R Managed R-Card has Kantara UMA Access Manager control control control Any protocol
  • 33.