PDA

View Full Version : "Identity ecosystem" to replace passwords, draft strategy suggests



BabushkaLady
28th June 2010, 05:45 PM
'Identity ecosystem' to replace passwords, draft strategy suggests

White house plan would base authentication on trusted digital identities
By Ben Bain
Jun 25, 2010

Imagine signing on to your computer, logging onto a secure Web site or handling a sensitive document electronically -- all without needing a user name or password.

The draft national strategy for building a new “identity ecosystem” that the Obama administration released June 25 would accomplish that, according to its developers. The ecosystem would base authentication on trusted digital identities instead.

The plan, named the National Strategy for Trusted Identities in Cyberspace, would lay a blueprint for an online environment in which online transactions for both the public and private sectors are more secure and trusted. The strategy identifies the federal government as “primary enabler, first adopter and key supporter” of the identity ecosystem.

In the language of the strategy, "In the envisioned identity ecosystem individuals, organizations, services, and devices would be able to trust each other because authoritative sources establish and authenticate their digital identities." What that means in real terms is that trusted providers such as a bank would issue security credentials that would then be accepted by other online resources such as social networking sites and e-mail providers. Rather than using a user name and password, the person would have the crediential on a device that would authenticate his or her identity to the computer and, by extension, to services that accept the credential. The strategy includes references to smart cards, USB drives, mobile devices, software certificates and trusted computing modules as possible authentication technologies.

The strategy provides a hypothetical case of of a woman whose husband has recently been in the hospital. She is able to access his medical information using her cell phone because everyone involved in the information exchange uses a "trustmark" that signifies they adhere to the identity ecosystem framework.

The woman would have established her digital identity when she subscribed to a cell phone service plan, and the phone carrier would have verified her identity based on defined standards and issued her a credential on her cell phone that she could use within the ecosystem. The hospital and her husband's primary care provider, in turn, would have validated and maintained the appropriate attributes needed to release the information. And at the very beginning of the process, her husband would have provided her name and phone number to the hospital and signed the needed documents to authorize release of his information.

“No longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to log into various online services,” White House Cybersecurity Coordinator Howard Schmidt said in a post on the White House blog. “Through the strategy we seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential…from a variety of service providers – both public and private – to authenticate themselves online for different types of transactions.”

Schmidt’s office has been led the effort and will continue to do so. The Homeland Security Department is collecting public comments on the plan through July 19. Schmidt said the strategy will be finalized this fall.

Officials say participation in the identity ecosystem must be voluntary. The draft document breaks the ecosystem down into execution, governance and management layers and explains how individuals, companies, and government would benefit from that online environment. For example, the document says individuals would get more security, efficiency, privacy and choice.

The document says goals for the strategy are to:

• Develop a comprehensive identity ecosystem framework.
• Put in place an interoperable identity infrastructure aligned with the identity ecosystem framework.
• Bolster willingness to participate in that ecosystem.
• Ensure the long-term success of the ecosystem.

The strategy also lays out high-level priority actions:

• Designate a federal agency to lead the public/private sector efforts.
• Develop a shared, comprehensive public/private sector omplementation plan.
• Accelerate the expansion of federal services and policies that align with ecosystem.
• Work among industry and government to put enhanced privacy protections in place.
• Coordinate the development of risk models and interoperability standards.
• Deal with liability worries of people and service providers.
• Perform outreach and awareness activities.
• Continue collaborating in international efforts.
• Identify other ways to push for adoption of the identity ecosystem nationwide.

“There is a compelling need to address these problems as soon as is practical, making progress in the short term and planning for the long-term,” the document concludes. “For the nation to realize the vision of this strategy and associated benefits, all stakeholders must come together in a collaborative partnership.”

Link Here (http://gcn.com/Articles/2010/06/25/National-Strategy-for-Trusted-Identities-in-Cyberspace.aspx?p=1)
==============================================

Here's another heads-up for what the administration is looking into. They just don't take any days off!

I laugh everytime a business wants my email address--they don't really believe that I don't have one--so far as they know, I'm just behind the times or stupid.

k-os
28th June 2010, 05:59 PM
This sounds like bad news to me. More tracking of everything I do, and linking it to everything I do, everything I buy, etc.

No thanks. :redfc

Quantum
28th June 2010, 09:16 PM
"And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name."

Revelation 13:17



Buy groceries? Present your Mark.

Sell precious metals? Present your Mark.

Visit the ER or see your doctor? Present your Mark.

Arrive at work? Present your Mark.

Make a phone call? Present your Mark.

Log on to the Internet or send an email? Present your Mark.


No, you can't stop it. It's coming, and it's going to happen. Foretold nearly 2000 years ago.

muffin
29th June 2010, 01:30 AM
That is interesting news. We all worry about the mark being rfid when it could be as simple as digital encryption. Imaging the rfid with the digitial encryption, where the device you are using reads your code from your rfid and then enables all other trusts within the system. That's starting to sound like the real deal. Your encryption rfid is the key to all access on any device to anything.

That's just scary. And they are thinking about this shit and you know they have it mapped out.

Skirnir
29th June 2010, 01:41 AM
The strategy includes references to smart cards, USB drives, mobile devices, software certificates and trusted computing modules as possible authentication technologies.

Until a concrete proposal is made, this appears benign. That said, RFID chips are not precluded and therefore possible.

TPTB
29th June 2010, 06:32 AM
This strategy is being implemented by Homeland Security. Doesn't that just make you feel all warm and snugly?