inimitable identity
play

Inimitable Identity from reality to utopia Tarvi Martens SK, - PowerPoint PPT Presentation

Inimitable Identity from reality to utopia Tarvi Martens SK, Estonia Pride of E-stonia 10 years of successful ID-card history Population: 1.3 Mio Penetration: 1.15 Mio e-Used: > 0.5 Mio persons > 3.5 Mio authentications


  1. Inimitable Identity from reality to utopia Tarvi Martens SK, Estonia

  2. Pride of E-stonia • 10 years of successful ID-card history • Population: 1.3 Mio • Penetration: 1.15 Mio • e-Used: > 0.5 Mio persons • > 3.5 Mio authentications / month • > 3 Mio digital signatures / month • 25% of votes over Internet (2011) 28.03.2012 Tarvi Martens 2

  3. Personal info from the (e)ID First name and last name Personal Identification Code (PIC) 47302200234 pseudorandom+checksum Female born in 20th century Birth date: 20.02.1973 28.03.2012 Tarvi Martens 3

  4. Personal info over the X- Road 28.03.2012 Tarvi Martens 4

  5. X-Road explained Data Protection Inspectorate PIC,z,... PIC,y,... PIC,x,... X-Road Citizen Portal PIC,ö,... PIC,ü,... PIC,ä,... PIC,õ,... 28.03.2012 Tarvi Martens 5

  6. Desirable qualities of ID • Uniqueness and persistency  OK  Achieved via infologistics and biometry • User control and consent  So-so  Hopefully law and guardians function • Minimal disclosure  NOK  eID minimum: name+gender+birthdate • Role-based identity  NOK  Always a citizen • Anonymity and pseudonymity  So-so  Services exist but hardly used 28.03.2012 Tarvi Martens 6

  7. wet dreams of ideal identity management You is You and you can’t deny it 28.03.2012 Tarvi Martens 7

  8. Initable Identity defined • There exists a foolproof method of deriving a number (IID – inimitable identity) from biometric data. The number is:  100% unique in The World  As short as possible • The derivation process is under full control of the person IID method 28.03.2012 Tarvi Martens 8

  9. Challenges for “method” • Biometry today is not 100% foolproof  But combination of methods might help • Body cells are replaced in every 7 years  Persistency could be achieved via proxies? • It is hard to maintain the derivation process under full control of the person  Sometimes – like in medical emergencies – it is neccessary to invoke the “method” when the person is not in full control... 28.03.2012 Tarvi Martens 9

  10. Attribute Authority defined • Attributes are assigned to persons (IID-s) by Attribute Authorities (AA) in form of assertions which bind IID to specific a attribute • One assertion is binding IID with one attribute at a time to ensure granularity • Attribute is assigned to a person only with agreement and full control of this person or his/her parents/custodians 28.03.2012 Tarvi Martens 10

  11. Examples of assertions Assertion AA In control {IID,BirthDate} MoI / local gov. Your parents {IID,BirthPlace} MoI / local gov. Your parents {IID,Name} MoI / local gov. Your parents/You {IID,Citizenship} MoI / local gov. Your parents/You {IID,MatrialStatus} MoI / local gov. You + spouse {IID,AcademicDegree} University You {IID,BloodGroup} Hospital You (?) 28.03.2012 Tarvi Martens 11

  12. Rules for AA • AA-s are obliged to keep attribute history • AA-s are capable of giving out assertions in real-time  Person never carries assertions with him/her • AA-s give out only with permission of the IID owner  Exceptions apply: Some attributes need to be public by definition Some attributes should be available to authorities 28.03.2012 Tarvi Martens 12

  13. AA information • Information about AA-s shall be maintained by the government TSL Tag  Ref: Trusted Lists of QCP-s Scheme Information TSP[1] Information TSP Service[1] Information History[1] Information Services Signed TSL History[2] Information List of TSP-s TSP Service[2] Information History Information TSP[2] Information Service Information Signature 28.03.2012 Tarvi Martens 13

  14. Special AA - CSP • Certification Service Providers assign public keys to IID-s  A person can have multiple certificates • “permission to release an assertion” means: {My_IID,AAid,”Surname”,3rd_person_IID, time } e.g. “Say to the 3rd_person what my Surname was 10 years ago” 28.03.2012 Tarvi Martens 14

  15. Roles and Aliases • An AA can assign derived IID-s  {IID,IID’} – my second IID but cannot be derived directly from my biometrics  {IID,IID job } – my professional IID • Attributes can be asserted to derived IID-s  {IID’,Name} – my artist name  {IID job ,Public_Key} – my certificate for professional signing 28.03.2012 Tarvi Martens 15

  16. ID qualities in the IID World • Uniqueness and persistency  OK  Achieved via • User control and consent  OK  AA-s do keep secrets • Minimal disclosure  OK  Attribute assignment is granular • Role-based identity • Anonymity and pseudonymity  OK  Derived IID-s will do the job 28.03.2012 Tarvi Martens 16

  17. From Reality to Utopia • Step1: obsolete paper documents, start behaving as AA-s:  Open online service instead of issuing passports, marriage certificates, diplomas etc • Step2: work out the “method” of deriving IID from physical person  Hint: Aadhaar in India • Keep the direction in mind 28.03.2012 Tarvi Martens 17

  18. Thank You! tarvi@sk.ee 28.03.2012 Tarvi Martens 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend