How to Manage Digital Multiple Identities Securely and Assuring Privacy on Internet

From IIW
Jump to: navigation, search

Session Topic: How to Manage Digital Multiple Identities (W5C)

Convener: Guido Marinelli

Notes-taker(s): Guido Marinelli

Tags for the session - technology discussed/ideas considered:

Multiple Identity, privacy, security, authentication, identity provider, user centric

Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:


Overview

The user centric identity management means that the user has the possibility to use, in an authentication process, only the attributes that are necessary to define the user profile needed for being authenticated. Moreover, a user can define a different identity credential for any different profile he needs or wishes.


Questions

How to use the identity provider and the “anonymous credential” concepts to support the user in managing his multiple identities and in preserving his personal data privacy.

How to avoid that the multiple identities management becomes boring and unsecure for the users.


Demo

Pip&Pops credential management software has been presented as an example of a tool to declare and manage, in a fast and secure way, user multiple identities.