SlideShare una empresa de Scribd logo
1 de 24
re-thinking identity – meeting public sector challenges




            what should the public sector
                     demand?
                                   Jerry Fishenden
                                  National Technology Officer
                                           Microsoft
                                    blog – http://ntouk.com
                               twitter – http://twitter.com/ntouk
realities of the threat landscape
• hackers
• crackers
• script kiddies …

• … and governments ….?
we need trust in our digital lives
        • any systems – private or public sector –
          need to:
           – recognise the importance of the rule of
             law, security, and privacy and other core
             democratic freedoms in contributing to
             trustworthiness
           – honour European values such as privacy,
             freedom of expression, protection of
             minorities, freedom of association, and
             freedom of belief
        • the public sector has a key role in
          overall governance and compliance in
          support of these important values
… not this …
… or this …
not a great model either …

                  your name, bank account
                  number, sort code number
                  … (conveniently embossed
                  for easy skimming)




     … your signature,                       234
     “security code” and
     “automated hacking
     magnetic strip”
improvements
so how about this?

paper world                          digital world




                                no need for this
                                vulnerability


         useful data … in the
         wrong hands
and this?
• enables users to
  use multiple
  identity systems
• based on Web
  services
• usable by any
  application
• strong 2-way
  authentication
• enhanced privacy
   – at user’s discretion,
     store personal
     information on
     PC/Phone/Device
     or in “the cloud”
   – fully informed
     disclosure
   – multiple personas,
     a mirror of the real
     world
so what should the public sector
          demand …?

        • not a 1940s-50s system based
          around identity cards
        • or a 1960s idea of computers
          sitting at the centre and seeing
          and knowing everything
           – (psst. government is no better at
             the centre of our lives than
             Microsoft Passport was …)
the public sector should demand …
         • a 21st century approach to identity
           with clear value and incentives for
           citizens, businesses and the public
           sector
         • proof of entitlement and authorisation
           to use a service, without necessarily
           identifying the user
            – that is, the disclosure of only the bare
              minimum of information necessary for a
              transaction:
               • for example, providing a proof that a person
                 is over or under a certain age threshold,
                 without disclosing their actual date of birth
                 or their age
• a choice of devices that makes sense
  not only to government, but also to
  us as citizens and to the commercial
  sector
• the effective management of
  electronic credentials throughout
  the lifecycle between issuance and
  revocation, in a privacy-friendly way
• decentralised governance of identity
  infrastructure across the private and
  public sectors, without the need or
  desire for anyone to sit in the
  middle and log and monitor
  everything we do in our daily lives
minimal disclosure tokens / U-Prove
minimal disclosure tokens: basics


Name:      Alice Smith                DOB:        03-25-1976
Name:      Alice Smith
Address:
Address:   1234 Crypto, Seattle, WA
           1234 Crypto, Seattle,      Reputation: high
Status:    gold customer
Status:    gold customer              Gender:     female
minimal disclosure tokens: basics


                                                      Which adult
                                    Prove that        from WA is
                                   you are from          this?
                                   WA and over
                                        21

                           ?                      ?

Name:    Alice Smith
Address: 1234 Crypto, Seattle, WA
         DOB:          03-25-1976 proof
                           Over-21
Status:  gold customer
         Reputation: high
         Gender:       female
authenticated anonymity
                          Prove that
                          you are a
                             gold
                          customer




Name:     Alice Smith
Address: 1234 Crypto, Seattle, WA
Status:   gold customer
unlinkable data sharing
   Name:    Alice Smith
   Address: 1234 Crypto, Seattle, WA
   Status:  gold customer




                            ?            UserID:
                                         City:
                                                   Alice S.
                                                   Seattle, WA
                                                          ?
                  No unwanted linkages




Name:     Alice Smith
           UserID: Alice S.
Address: 1234 Crypto, Seattle, WA
Status:   gold customer
… and at the macro level
    • fundamental reform of the
      policymaking process:
      – ensure technological and scientific
        evidence is gathered and understood
        prior to legislation being brought
        forward
         • eg avoid ‘the Identity Cards Act’ model,
           where the mechanism/solution (cards) is
           fused with the objective and policy
           outcome
    • don’t plan based on what you can
      see in the rear-view mirror
conclusion
• the public sector can help raise the game for
  everyone:
  – placing the citizen at the centre and in control (not at
    the centre under permanent and routine surveillance)
  – empowering the citizen with additional safeguards
    and protections well beyond those that the current
    plastic cards in our wallets and purses provide
  – acting as a catalyst to encourage the adoption of user-
    centric, not provider-centric, models
• hence helping ensure that a twenty-first
  identity framework …
  – underpins the rule of law, security, and privacy
    and other core democratic freedoms in
    contributing to trustworthiness
  – honours European values such as privacy, freedom
    of expression, protection of minorities, freedom of
    association, and freedom of belief
some links
• Kim Cameron’s blog
  http://www.identityblog.com/
• Stefan Brands’ work
  http://www.credentica.com/
• CardSpace http://msdn.microsoft.com/en-
  us/library/aa480189.aspx
• Trust in Digital Life http://trustindigitallife.eu
re-thinking identity – meeting public sector challenges




                                 thank you …

                                   Jerry Fishenden
                                  National Technology Officer
                                           Microsoft
                                    blog – http://ntouk.com
                               twitter – http://twitter.com/ntouk

Más contenido relacionado

La actualidad más candente

Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...Timothy Holborn
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts Timothy Holborn
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkDarren Kuropatwa
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
 
Legal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaLegal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaDayo Ogunyemi
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge bankingTimothy Holborn
 
NGI Mobile Identity Utility
NGI Mobile Identity UtilityNGI Mobile Identity Utility
NGI Mobile Identity UtilityDavid Birch
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
IoT... The mind of minds
IoT... The mind of mindsIoT... The mind of minds
IoT... The mind of mindsMalek Al Haddad
 

La actualidad más candente (19)

Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...feb 2018 - Sub22 - The impact of new and emerging information and communicati...
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
 
March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts March 2013 Australian Centre Liberal Arts
March 2013 Australian Centre Liberal Arts
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship Framework
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyFeb 2020 - Senate Submission Financial Technology and Regulatory Technology
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
 
Legal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas AfricaLegal Framework For E Commerce In Ecowas Africa
Legal Framework For E Commerce In Ecowas Africa
 
Basema aljaberi tra
Basema  aljaberi  traBasema  aljaberi  tra
Basema aljaberi tra
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 
eGovernment in Belgium
eGovernment in Belgium eGovernment in Belgium
eGovernment in Belgium
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
E commerce
E commerceE commerce
E commerce
 
2012 OCT knowledge banking
2012 OCT knowledge banking2012 OCT knowledge banking
2012 OCT knowledge banking
 
NGI Mobile Identity Utility
NGI Mobile Identity UtilityNGI Mobile Identity Utility
NGI Mobile Identity Utility
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
IoT... The mind of minds
IoT... The mind of mindsIoT... The mind of minds
IoT... The mind of minds
 

Similar a What Should The Public Sector Demand Jerry Fishenden 15.05.2009

Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingInês Almeida
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Juan Llanos
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)TransUnion
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty PresentationRay Brannon
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...netwealthInvest
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyVladislav Solodkiy
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)Felipe Prado
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipSloane Joie Trugman
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)JISC.AM
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongSSIMeetup
 

Similar a What Should The Public Sector Demand Jerry Fishenden 15.05.2009 (20)

Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23
 
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
Gartner Offers a Converged and Compelling Future (Gartner Report Part 1)
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
WCCC Faculty Presentation
WCCC Faculty PresentationWCCC Faculty Presentation
WCCC Faculty Presentation
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
Netwealth educational webinar - Top 10 learnings from Silicon Valley fintech ...
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Govt2.0
Govt2.0Govt2.0
Govt2.0
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new money
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)2600 v13 n4 (winter 1996)
2600 v13 n4 (winter 1996)
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. LeongIdentity and Privacy: Past, Present, and Digital - Brenda K. Leong
Identity and Privacy: Past, Present, and Digital - Brenda K. Leong
 

Más de Jerry Fishenden

2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impact2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impactJerry Fishenden
 
Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008Jerry Fishenden
 
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry FishendenInteractive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry FishendenJerry Fishenden
 
uk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principlesuk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principlesJerry Fishenden
 
Designing online social security for the future
Designing online social security for the futureDesigning online social security for the future
Designing online social security for the futureJerry Fishenden
 
Open Forum Summit June 2010
Open Forum Summit June 2010Open Forum Summit June 2010
Open Forum Summit June 2010Jerry Fishenden
 
The Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference AbridgedThe Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference AbridgedJerry Fishenden
 

Más de Jerry Fishenden (7)

2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impact2006 — Technology Adoption: emerging technologies and their likely impact
2006 — Technology Adoption: emerging technologies and their likely impact
 
Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008Reinventing government for the Internet age Jerry Fishenden 2008
Reinventing government for the Internet age Jerry Fishenden 2008
 
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry FishendenInteractive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
 
uk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principlesuk identity assurance programme - IDA draft principles
uk identity assurance programme - IDA draft principles
 
Designing online social security for the future
Designing online social security for the futureDesigning online social security for the future
Designing online social security for the future
 
Open Forum Summit June 2010
Open Forum Summit June 2010Open Forum Summit June 2010
Open Forum Summit June 2010
 
The Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference AbridgedThe Future Of Creative Technologies Conference Abridged
The Future Of Creative Technologies Conference Abridged
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

What Should The Public Sector Demand Jerry Fishenden 15.05.2009

  • 1. re-thinking identity – meeting public sector challenges what should the public sector demand? Jerry Fishenden National Technology Officer Microsoft blog – http://ntouk.com twitter – http://twitter.com/ntouk
  • 2. realities of the threat landscape • hackers • crackers • script kiddies … • … and governments ….?
  • 3. we need trust in our digital lives • any systems – private or public sector – need to: – recognise the importance of the rule of law, security, and privacy and other core democratic freedoms in contributing to trustworthiness – honour European values such as privacy, freedom of expression, protection of minorities, freedom of association, and freedom of belief • the public sector has a key role in overall governance and compliance in support of these important values
  • 6. not a great model either … your name, bank account number, sort code number … (conveniently embossed for easy skimming) … your signature, 234 “security code” and “automated hacking magnetic strip”
  • 8. so how about this? paper world digital world no need for this vulnerability useful data … in the wrong hands
  • 9. and this? • enables users to use multiple identity systems • based on Web services • usable by any application
  • 10. • strong 2-way authentication • enhanced privacy – at user’s discretion, store personal information on PC/Phone/Device or in “the cloud” – fully informed disclosure – multiple personas, a mirror of the real world
  • 11. so what should the public sector demand …? • not a 1940s-50s system based around identity cards • or a 1960s idea of computers sitting at the centre and seeing and knowing everything – (psst. government is no better at the centre of our lives than Microsoft Passport was …)
  • 12. the public sector should demand … • a 21st century approach to identity with clear value and incentives for citizens, businesses and the public sector • proof of entitlement and authorisation to use a service, without necessarily identifying the user – that is, the disclosure of only the bare minimum of information necessary for a transaction: • for example, providing a proof that a person is over or under a certain age threshold, without disclosing their actual date of birth or their age
  • 13. • a choice of devices that makes sense not only to government, but also to us as citizens and to the commercial sector • the effective management of electronic credentials throughout the lifecycle between issuance and revocation, in a privacy-friendly way • decentralised governance of identity infrastructure across the private and public sectors, without the need or desire for anyone to sit in the middle and log and monitor everything we do in our daily lives
  • 15. minimal disclosure tokens: basics Name: Alice Smith DOB: 03-25-1976 Name: Alice Smith Address: Address: 1234 Crypto, Seattle, WA 1234 Crypto, Seattle, Reputation: high Status: gold customer Status: gold customer Gender: female
  • 16. minimal disclosure tokens: basics Which adult Prove that from WA is you are from this? WA and over 21 ? ? Name: Alice Smith Address: 1234 Crypto, Seattle, WA DOB: 03-25-1976 proof Over-21 Status: gold customer Reputation: high Gender: female
  • 17. authenticated anonymity Prove that you are a gold customer Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer
  • 18. unlinkable data sharing Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer ? UserID: City: Alice S. Seattle, WA ? No unwanted linkages Name: Alice Smith UserID: Alice S. Address: 1234 Crypto, Seattle, WA Status: gold customer
  • 19.
  • 20. … and at the macro level • fundamental reform of the policymaking process: – ensure technological and scientific evidence is gathered and understood prior to legislation being brought forward • eg avoid ‘the Identity Cards Act’ model, where the mechanism/solution (cards) is fused with the objective and policy outcome • don’t plan based on what you can see in the rear-view mirror
  • 21. conclusion • the public sector can help raise the game for everyone: – placing the citizen at the centre and in control (not at the centre under permanent and routine surveillance) – empowering the citizen with additional safeguards and protections well beyond those that the current plastic cards in our wallets and purses provide – acting as a catalyst to encourage the adoption of user- centric, not provider-centric, models
  • 22. • hence helping ensure that a twenty-first identity framework … – underpins the rule of law, security, and privacy and other core democratic freedoms in contributing to trustworthiness – honours European values such as privacy, freedom of expression, protection of minorities, freedom of association, and freedom of belief
  • 23. some links • Kim Cameron’s blog http://www.identityblog.com/ • Stefan Brands’ work http://www.credentica.com/ • CardSpace http://msdn.microsoft.com/en- us/library/aa480189.aspx • Trust in Digital Life http://trustindigitallife.eu
  • 24. re-thinking identity – meeting public sector challenges thank you … Jerry Fishenden National Technology Officer Microsoft blog – http://ntouk.com twitter – http://twitter.com/ntouk