SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Identity in the Internet Age
By Michael Dargue and William Wadsworth
The traditional password model of identity management is no longer fit-for-purpose. Increased
security risks and growing consumer frustration have prompted a number of alternatives: multi-
factor authentication, biometrics, and federated identity. Online media giants have been quick to
enter this market, but opportunities exist for other players to differentiate and capture value.
September 2013
Cartesian: Identity in the Internet Age
Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 1
Identity Management: An Inadequate Status Quo
Around the world, consumers, businesses and government are moving more of their transactions and
interactions online. Online services can have transformative benefits in efficiency and convenience – for
suppliers of goods and services and their customers alike – but weak security practices create a growing risk
of identity theft and fraud, increasing the need for secure and reliable identity management.
The familiar model of a unique username and password has its roots in
a pre-Internet era, where many users had only one computer to log in
to. Such a model may be appropriate for local computers, but it quickly
became insecure at Internet-scale, as end-users and system admins
have found to their cost. The average user today has 26 online
identities, but shares just five passwords across them.1
If the security
of one site is breached, then all accounts using the same password are
compromised: the “break once, break everywhere” problem. Worse,
many users are choosing simple passwords which are trivial to guess
or break through a dictionary attack; one dataset suggests that over
11% of passwords appear on the list of the five most commonly used
(see Figure 1).2
With the annual cost to businesses from consumer cybercrime estimated at $110B annually, and 63% of US
citizens reporting denied access to an account because of forgotten authentication details, the need for an
alternative solution for the Internet age is clear.3,4
Why Do We Need Identity Mechanisms?
Before discussing potential solutions to these challenges, it is useful to first consider the objectives of
security mechanisms: authentication, authorization, and accountability.
 Authentication: Establishing user identity
 Authorization: Permitting only authorized users to access protected content and services
 Accountability: Establishing a record of an event or transaction
Getting this “AAA” triplet right is essential for consumers – protecting their online bank account, for example
– and also for suppliers of online services, who can face considerable reputational risk in the event of
security breach, and may also rely on authentication for revenue protection, for example by controlling
access to content behind a pay-wall. The level of security provided, and corresponding benefits, will always
have to be balanced against the associated costs:
1 Experian, July 2012
2 Mark Burnett “10,000 Top Passwords” (http://xato.net/passwords/more-top-worst-passwords/#.UiVaLDZeYpo)
3 Nok-Nok Labs Consumer Attitudes On Online Authentication study, 2012
4
Symantec, September 2012
Figure 1: Most-used
Online Passwords2
Frequency Password
4.7% password
3.8% 123456
1.3% 12345678
0.8% 1234
0.8% Qwerty
Cartesian: Identity in the Internet Age
Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 2
Figure 2: Costs and Benefits of a Secure Identity System
Costs Benefits
Consumer
• Inconvenience
• Loss of anonymity
• Protection of personal content
• Defence against impersonation
• Non-repudiation of transactions
Supplier
• Implementation costs
• Operating costs
• Potential barrier to user adoption
• Protection of content and services
• Establishes greater trust in the service
• Non-repudiation of transactions
Solving the Password Problem
A recent survey found that 38% of people would rather fold laundry and scrub toilets than come up with
new passwords.5
A number of approaches exist to mitigate the risk from password re-use, including multi-
factor authentication, biometric identification, and federated security.
Multi-factor Authentication
Multi-factor authentication schemes strengthen security by combining something the user knows (the
password) with something the user has (such as a token) and/or something the user is (see biometric
identification, below). Pseudo-random code generating devices have been used in this regard, however the
inconvenience of carrying and using a code generator (such as a key fob) has limited adoption. While popular
in secure enterprise environments, consumer use thus far has been limited: users will only tolerate the
hassle when accessing those services needing the highest security, such as online banking. More recently,
code generators have been implemented as smartphone apps. The extent to which this promotes wider use
remains to be seen.
Biometric Identification
Biometric identification may be used as a component of multi-factor authentication, or on a standalone
basis. Examples of biometric signatures include fingerprint, iris pattern, facial recognition and heartbeat.
Fingerprint-based technology has been readily available for many years, being featured in laptops from
manufacturers such as HP, Lenovo and Sony, while ING Direct Canada, an online bank, has issued customers
with computer mice equipped with fingerprint recognition system. Until now, the technology has largely
remained a novelty feature outside niche markets – perhaps due to hardware costs and imperfect,
unreliable execution. However, Apple’s inclusion of fingerprint authentication in the iPhone 5S could mark
the beginning of biometric authentication’s move to the mainstream.
5
Harris Interactive: “The 2012 Online Registration and Password” study
Cartesian: Identity in the Internet Age
Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 3
Password Management and Federated Authentication
Similarly poised to address the identification needs of the mass market are providers of password
management and federated authentication services. Password management applications such as LastPass
and RoboForm allow subscribers to recreate the single-password experience of those early computing days:
once logged in via a master-password, the application will auto-fill log-in details for all other authenticated
sites. Established security service providers have launched similar services, with Symantec bundling “Norton
Identity Safe” services at no extra cost as a means of adding value to its anti-virus products.
Federated security approaches such as OpenID enable existing online accounts to be used to sign in to new
authenticated-access websites. Online media giants such as Facebook and Google have moved to leverage
their vast user-bases (1.11B and 425M respectively) to offer such “federated authentication” services.6,7
This model helps the third-party websites lower the barrier to user-adoption by removing the need for yet
another password, while the media companies enjoy increased knowledge of user behaviour, enabling yet
more targeted advertising to be served to individuals. Such monetisation of identity could almost be said to
add a “fourth A” – advertising – to the “AAA” triplet.
The Future of Identity
Federated security and password management are being adopted enthusiastically – with over 50,000
websites accepting OpenID for logins, and RoboForm reporting “millions” of active users – but these services
are not yet suitable for providing the high-security, high-reliability authentication demanded by services
such as online banking and public services.8,9
For such “high-end” services, trusted service providers such as
financial institutions, governments and mobile operators may be well-placed to offer identity management
services by becoming “aggregators” within their domain, and potentially beyond.
Financial Institutions
Mint.com, a division of accountancy software maker Intuit, offers credit monitoring and personal budgeting
services, relying on centrally-authenticated access to all of a user’s online bank and credit card accounts to
aggregate transaction and balance information across the user’s financial estate. In the UK, Internet bank
First Direct offers a similar service with its “Internet Banking Plus” feature. In future, such portals could be
developed to facilitate full access to all of a user’s online banking, credit card, and insurance accounts.
Financial services companies – including banks, providers of credit, and credit score providers – are well-
positioned to offer such services given their existing security infrastructure assets and processes, and a
“trusted service provider” brand status.
6 Facebook, March 2013
7 Number of Gmail users, Google, June 2013
8 OpenID, accessed September 2013 (http://openid.net/get-an-openid/what-is-openid/)
9
RoboForm, accessed September 2013 (http://www.roboform.com/about)
Cartesian: Identity in the Internet Age
Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 4
Government
In the wake of the scramble to move public services online, governments have been working to rationalise
their identity management estate. The Netherlands’ “DigiD” service now provides single-password to access
over 500 local and national public service organisations, while the US government is working to allow all
federal services to be accessed by passwords from approved third parties, such as Google or PayPal, through
the “Federal Cloud Credential Exchange” programme.
Other governments – such as Germany, Italy, Spain, Pakistan and Morocco – have adopted the “Electronic
Identity Card” or “eID” format: a physical identity card with embedded microchip, allowing both virtual and
physical authentication. The world’s first electronic parliamentary elections were held in Estonia in 2007,
powered by the Estonia eID card. The European Union’s “STORK” programme (“Secure idenTity acrOss
boRders linked”) is working towards a “digital single market by 2015”, allowing recognition of national
electronic identity (eID) across the European single market.
A unified, user-friendly approach to public-sector identity not only reduces IT operating costs across
numerous government departments, but also drives adoption of online public services, which are often
cheaper to provide than their offline equivalent (e.g. a physical or telephone helpdesk).
Mobile Operators and Manufacturers
The mobile phone represents an under-used security asset which is already in the hands of billions of users
worldwide. The Subscriber Information Module (SIM) allows Mobile Network Operators (MNOs) to
authorize access to services and bill for use,
providing a crypto-graphically-protected
unique identifier for each subscriber. SIM-
based security combines many of the
benefits of federated identity, multi-factor
authentication, and even biometric
authentication, as illustrated in Figure 3.
The revenue potential is considerable.
Turkish operator Turkcell charges 5 Turkish
Liras (£1.56, or $2.74) per month for its
“Mobil imza” application, which it launched
in 2007 to facilitate secure, legally-binding
consumer and enterprise transactions. This
represents ARPU uplift of 25%. Although
adoption is currently low in absolute terms,
it has been growing at 80% per year.10
10
GSMA, 2012: “Mobile Signature in Turkey”
Figure 3: Advantages of Mobile-based Identity
Cartesian: Identity in the Internet Age
Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 5
MNOs and MVNOs are not the only players to be able to take advantage of mobile identity: the latest
smartphones contain an embedded secure element, providing SIM-like security, beyond the control of the
MNO. This creates opportunities for the likes of Apple, Google, Samsung and Microsoft to develop wider
Identity Management capabilities.
Identifying Opportunities
For companies looking to monetise their assets beyond their historical core competency, then, Identity
Management offers an intriguing strategic option: not only generating new revenue streams, but also
increased customer loyalty and brand status. Financial institutions, government, and MNOs are all regarded
as “trusted service providers”, and benefit from large user-bases and strong customer-service systems: the
ideal foundations on which to build an Identity Management service.
As an increasingly cynical consumer body becomes wary of ceding more control of their identities to media
companies who track and monitor their actions to sell adverts, perhaps the world will look to today’s banks,
governments, or phone operators to manage the next generation of identity.
Cartesian is a specialist consulting firm of industry experts, focused exclusively on the communications,
technology and digital media sector. For over 20 years, Cartesian has advised clients in strategy
development and assisted them in execution against their goals. Our unique portfolio of professional
services and managed solutions are tailored to the specific challenges faced by executives in these fast-
moving industries. Combining strategic thinking and practical experience, we deliver superior results.
Contact us to find out more about how our services can take your business forward in the Identity
Management field:
 Opportunity assessment: Customer insight, opportunity sizing, competitive assessment
 Business case development: Financial modelling, entry option analysis, scenario planning
 Go-to-market strategy: Market proposition, pricing, partner and distribution strategy
 Technical execution: Business requirements, solutions design, implementation and assurance
 Data analysis: Award-winning Ascertain® data analytics platform
www.cartesian.com
For further information, please contact us at cartesian@cartesian.com

Contenu connexe

Tendances

National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015TransUnion
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Citizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsCitizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsConor Bronsdon
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTForgeRock
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsRexcy
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsLapman Lee ✔
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Surveyadremllc
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldUbisecure
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Secure Identity Alliance
 

Tendances (19)

National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015Mobile Banking Security Risks and Consequences iovation2015
Mobile Banking Security Risks and Consequences iovation2015
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
My DocSafe white paper 1
My DocSafe white paper 1My DocSafe white paper 1
My DocSafe white paper 1
 
Citizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutionsCitizen Digital Identity: Enabling and empowering individuals and institutions
Citizen Digital Identity: Enabling and empowering individuals and institutions
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital Identity
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Survey
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
Telia - The New Norm of the Digital World
Telia - The New Norm of the Digital WorldTelia - The New Norm of the Digital World
Telia - The New Norm of the Digital World
 
Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...Accelerating the creation and deployment of e-Government services by ensuring...
Accelerating the creation and deployment of e-Government services by ensuring...
 

En vedette

Over the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityOver the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityCartesian (formerly CSMG)
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Cartesian (formerly CSMG)
 
Wholesale Charging: Meeting the Needs of Mobile Data
Wholesale Charging: Meeting the Needs of Mobile DataWholesale Charging: Meeting the Needs of Mobile Data
Wholesale Charging: Meeting the Needs of Mobile DataCartesian (formerly CSMG)
 
The Future of MVNO's.....a Cartesian perspective>
The Future of MVNO's.....a Cartesian perspective>The Future of MVNO's.....a Cartesian perspective>
The Future of MVNO's.....a Cartesian perspective>Millennial Mobility
 
International Opportunities for Asian MVNOs and Service Providers
International Opportunities for Asian MVNOs and Service ProvidersInternational Opportunities for Asian MVNOs and Service Providers
International Opportunities for Asian MVNOs and Service ProvidersCartesian (formerly CSMG)
 
Turkcell assignment-Strategic management
Turkcell assignment-Strategic managementTurkcell assignment-Strategic management
Turkcell assignment-Strategic managementAhmed Adel
 
Turkcell Tone&Win
Turkcell Tone&WinTurkcell Tone&Win
Turkcell Tone&WinEvrim Dirik
 
Data Monetization: Leveraging Subscriber Data to Create New Opportunities
Data Monetization: Leveraging Subscriber Data to Create New OpportunitiesData Monetization: Leveraging Subscriber Data to Create New Opportunities
Data Monetization: Leveraging Subscriber Data to Create New OpportunitiesCartesian (formerly CSMG)
 
AT&T: 20 Years of Change
AT&T: 20 Years of ChangeAT&T: 20 Years of Change
AT&T: 20 Years of ChangeAdham Ghaly
 
MVNO for Financial Services - Cartesian - June 2015
MVNO for Financial Services - Cartesian - June 2015MVNO for Financial Services - Cartesian - June 2015
MVNO for Financial Services - Cartesian - June 2015Cartesian
 
AT&T Strategic Analysis
AT&T Strategic AnalysisAT&T Strategic Analysis
AT&T Strategic AnalysisEbrahim Alavi
 

En vedette (20)

Apple TV: Evolution or Revolution?
Apple TV: Evolution or Revolution?Apple TV: Evolution or Revolution?
Apple TV: Evolution or Revolution?
 
Over the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityOver the top: Operator Threat and Opportunity
Over the top: Operator Threat and Opportunity
 
New Models for Device Financing
New Models for Device FinancingNew Models for Device Financing
New Models for Device Financing
 
Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?Widespread Cloud Adoption: What's Taking So Long?
Widespread Cloud Adoption: What's Taking So Long?
 
Wholesale Charging: Meeting the Needs of Mobile Data
Wholesale Charging: Meeting the Needs of Mobile DataWholesale Charging: Meeting the Needs of Mobile Data
Wholesale Charging: Meeting the Needs of Mobile Data
 
Telecom Strategies for Postal Operators
Telecom Strategies for Postal OperatorsTelecom Strategies for Postal Operators
Telecom Strategies for Postal Operators
 
M2M Analytics: A New Wave of Innovation
M2M Analytics: A New Wave of InnovationM2M Analytics: A New Wave of Innovation
M2M Analytics: A New Wave of Innovation
 
The Future of Customer Data Monetisation
The Future of Customer Data MonetisationThe Future of Customer Data Monetisation
The Future of Customer Data Monetisation
 
The Future of MVNO's.....a Cartesian perspective>
The Future of MVNO's.....a Cartesian perspective>The Future of MVNO's.....a Cartesian perspective>
The Future of MVNO's.....a Cartesian perspective>
 
International Opportunities for Asian MVNOs and Service Providers
International Opportunities for Asian MVNOs and Service ProvidersInternational Opportunities for Asian MVNOs and Service Providers
International Opportunities for Asian MVNOs and Service Providers
 
Turkcell assignment-Strategic management
Turkcell assignment-Strategic managementTurkcell assignment-Strategic management
Turkcell assignment-Strategic management
 
Turkcell
Turkcell Turkcell
Turkcell
 
02_boynudelik_09_06_2015
02_boynudelik_09_06_201502_boynudelik_09_06_2015
02_boynudelik_09_06_2015
 
Turkcell Tone&Win
Turkcell Tone&WinTurkcell Tone&Win
Turkcell Tone&Win
 
Data Monetization: Leveraging Subscriber Data to Create New Opportunities
Data Monetization: Leveraging Subscriber Data to Create New OpportunitiesData Monetization: Leveraging Subscriber Data to Create New Opportunities
Data Monetization: Leveraging Subscriber Data to Create New Opportunities
 
AT&T: 20 Years of Change
AT&T: 20 Years of ChangeAT&T: 20 Years of Change
AT&T: 20 Years of Change
 
Turkcell
TurkcellTurkcell
Turkcell
 
MVNO for Financial Services - Cartesian - June 2015
MVNO for Financial Services - Cartesian - June 2015MVNO for Financial Services - Cartesian - June 2015
MVNO for Financial Services - Cartesian - June 2015
 
TURKCELL CASE STUDY
TURKCELL CASE STUDYTURKCELL CASE STUDY
TURKCELL CASE STUDY
 
AT&T Strategic Analysis
AT&T Strategic AnalysisAT&T Strategic Analysis
AT&T Strategic Analysis
 

Similaire à Identity in the Internet Age

Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca vMike Kuhn
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​Gigya
 
Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Earnest Sweat
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...Milos Pesic
 
The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...Techgropse Pvt.Ltd.
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgeAgile Financial Technologies
 
The 5 Biggest Financial Services Tech Trends In 2022
The 5 Biggest Financial Services Tech Trends In 2022The 5 Biggest Financial Services Tech Trends In 2022
The 5 Biggest Financial Services Tech Trends In 2022Bernard Marr
 
Tarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web BrowserTarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web BrowserTarun Gaur
 

Similaire à Identity in the Internet Age (20)

Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)Early Stage Fintech Investment Thesis (Sept 2016)
Early Stage Fintech Investment Thesis (Sept 2016)
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
 
The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
The 5 Biggest Financial Services Tech Trends In 2022
The 5 Biggest Financial Services Tech Trends In 2022The 5 Biggest Financial Services Tech Trends In 2022
The 5 Biggest Financial Services Tech Trends In 2022
 
Tarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web BrowserTarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web Browser
 

Dernier

Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 

Dernier (20)

Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 

Identity in the Internet Age

  • 1. Identity in the Internet Age By Michael Dargue and William Wadsworth The traditional password model of identity management is no longer fit-for-purpose. Increased security risks and growing consumer frustration have prompted a number of alternatives: multi- factor authentication, biometrics, and federated identity. Online media giants have been quick to enter this market, but opportunities exist for other players to differentiate and capture value. September 2013
  • 2. Cartesian: Identity in the Internet Age Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 1 Identity Management: An Inadequate Status Quo Around the world, consumers, businesses and government are moving more of their transactions and interactions online. Online services can have transformative benefits in efficiency and convenience – for suppliers of goods and services and their customers alike – but weak security practices create a growing risk of identity theft and fraud, increasing the need for secure and reliable identity management. The familiar model of a unique username and password has its roots in a pre-Internet era, where many users had only one computer to log in to. Such a model may be appropriate for local computers, but it quickly became insecure at Internet-scale, as end-users and system admins have found to their cost. The average user today has 26 online identities, but shares just five passwords across them.1 If the security of one site is breached, then all accounts using the same password are compromised: the “break once, break everywhere” problem. Worse, many users are choosing simple passwords which are trivial to guess or break through a dictionary attack; one dataset suggests that over 11% of passwords appear on the list of the five most commonly used (see Figure 1).2 With the annual cost to businesses from consumer cybercrime estimated at $110B annually, and 63% of US citizens reporting denied access to an account because of forgotten authentication details, the need for an alternative solution for the Internet age is clear.3,4 Why Do We Need Identity Mechanisms? Before discussing potential solutions to these challenges, it is useful to first consider the objectives of security mechanisms: authentication, authorization, and accountability.  Authentication: Establishing user identity  Authorization: Permitting only authorized users to access protected content and services  Accountability: Establishing a record of an event or transaction Getting this “AAA” triplet right is essential for consumers – protecting their online bank account, for example – and also for suppliers of online services, who can face considerable reputational risk in the event of security breach, and may also rely on authentication for revenue protection, for example by controlling access to content behind a pay-wall. The level of security provided, and corresponding benefits, will always have to be balanced against the associated costs: 1 Experian, July 2012 2 Mark Burnett “10,000 Top Passwords” (http://xato.net/passwords/more-top-worst-passwords/#.UiVaLDZeYpo) 3 Nok-Nok Labs Consumer Attitudes On Online Authentication study, 2012 4 Symantec, September 2012 Figure 1: Most-used Online Passwords2 Frequency Password 4.7% password 3.8% 123456 1.3% 12345678 0.8% 1234 0.8% Qwerty
  • 3. Cartesian: Identity in the Internet Age Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 2 Figure 2: Costs and Benefits of a Secure Identity System Costs Benefits Consumer • Inconvenience • Loss of anonymity • Protection of personal content • Defence against impersonation • Non-repudiation of transactions Supplier • Implementation costs • Operating costs • Potential barrier to user adoption • Protection of content and services • Establishes greater trust in the service • Non-repudiation of transactions Solving the Password Problem A recent survey found that 38% of people would rather fold laundry and scrub toilets than come up with new passwords.5 A number of approaches exist to mitigate the risk from password re-use, including multi- factor authentication, biometric identification, and federated security. Multi-factor Authentication Multi-factor authentication schemes strengthen security by combining something the user knows (the password) with something the user has (such as a token) and/or something the user is (see biometric identification, below). Pseudo-random code generating devices have been used in this regard, however the inconvenience of carrying and using a code generator (such as a key fob) has limited adoption. While popular in secure enterprise environments, consumer use thus far has been limited: users will only tolerate the hassle when accessing those services needing the highest security, such as online banking. More recently, code generators have been implemented as smartphone apps. The extent to which this promotes wider use remains to be seen. Biometric Identification Biometric identification may be used as a component of multi-factor authentication, or on a standalone basis. Examples of biometric signatures include fingerprint, iris pattern, facial recognition and heartbeat. Fingerprint-based technology has been readily available for many years, being featured in laptops from manufacturers such as HP, Lenovo and Sony, while ING Direct Canada, an online bank, has issued customers with computer mice equipped with fingerprint recognition system. Until now, the technology has largely remained a novelty feature outside niche markets – perhaps due to hardware costs and imperfect, unreliable execution. However, Apple’s inclusion of fingerprint authentication in the iPhone 5S could mark the beginning of biometric authentication’s move to the mainstream. 5 Harris Interactive: “The 2012 Online Registration and Password” study
  • 4. Cartesian: Identity in the Internet Age Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 3 Password Management and Federated Authentication Similarly poised to address the identification needs of the mass market are providers of password management and federated authentication services. Password management applications such as LastPass and RoboForm allow subscribers to recreate the single-password experience of those early computing days: once logged in via a master-password, the application will auto-fill log-in details for all other authenticated sites. Established security service providers have launched similar services, with Symantec bundling “Norton Identity Safe” services at no extra cost as a means of adding value to its anti-virus products. Federated security approaches such as OpenID enable existing online accounts to be used to sign in to new authenticated-access websites. Online media giants such as Facebook and Google have moved to leverage their vast user-bases (1.11B and 425M respectively) to offer such “federated authentication” services.6,7 This model helps the third-party websites lower the barrier to user-adoption by removing the need for yet another password, while the media companies enjoy increased knowledge of user behaviour, enabling yet more targeted advertising to be served to individuals. Such monetisation of identity could almost be said to add a “fourth A” – advertising – to the “AAA” triplet. The Future of Identity Federated security and password management are being adopted enthusiastically – with over 50,000 websites accepting OpenID for logins, and RoboForm reporting “millions” of active users – but these services are not yet suitable for providing the high-security, high-reliability authentication demanded by services such as online banking and public services.8,9 For such “high-end” services, trusted service providers such as financial institutions, governments and mobile operators may be well-placed to offer identity management services by becoming “aggregators” within their domain, and potentially beyond. Financial Institutions Mint.com, a division of accountancy software maker Intuit, offers credit monitoring and personal budgeting services, relying on centrally-authenticated access to all of a user’s online bank and credit card accounts to aggregate transaction and balance information across the user’s financial estate. In the UK, Internet bank First Direct offers a similar service with its “Internet Banking Plus” feature. In future, such portals could be developed to facilitate full access to all of a user’s online banking, credit card, and insurance accounts. Financial services companies – including banks, providers of credit, and credit score providers – are well- positioned to offer such services given their existing security infrastructure assets and processes, and a “trusted service provider” brand status. 6 Facebook, March 2013 7 Number of Gmail users, Google, June 2013 8 OpenID, accessed September 2013 (http://openid.net/get-an-openid/what-is-openid/) 9 RoboForm, accessed September 2013 (http://www.roboform.com/about)
  • 5. Cartesian: Identity in the Internet Age Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 4 Government In the wake of the scramble to move public services online, governments have been working to rationalise their identity management estate. The Netherlands’ “DigiD” service now provides single-password to access over 500 local and national public service organisations, while the US government is working to allow all federal services to be accessed by passwords from approved third parties, such as Google or PayPal, through the “Federal Cloud Credential Exchange” programme. Other governments – such as Germany, Italy, Spain, Pakistan and Morocco – have adopted the “Electronic Identity Card” or “eID” format: a physical identity card with embedded microchip, allowing both virtual and physical authentication. The world’s first electronic parliamentary elections were held in Estonia in 2007, powered by the Estonia eID card. The European Union’s “STORK” programme (“Secure idenTity acrOss boRders linked”) is working towards a “digital single market by 2015”, allowing recognition of national electronic identity (eID) across the European single market. A unified, user-friendly approach to public-sector identity not only reduces IT operating costs across numerous government departments, but also drives adoption of online public services, which are often cheaper to provide than their offline equivalent (e.g. a physical or telephone helpdesk). Mobile Operators and Manufacturers The mobile phone represents an under-used security asset which is already in the hands of billions of users worldwide. The Subscriber Information Module (SIM) allows Mobile Network Operators (MNOs) to authorize access to services and bill for use, providing a crypto-graphically-protected unique identifier for each subscriber. SIM- based security combines many of the benefits of federated identity, multi-factor authentication, and even biometric authentication, as illustrated in Figure 3. The revenue potential is considerable. Turkish operator Turkcell charges 5 Turkish Liras (£1.56, or $2.74) per month for its “Mobil imza” application, which it launched in 2007 to facilitate secure, legally-binding consumer and enterprise transactions. This represents ARPU uplift of 25%. Although adoption is currently low in absolute terms, it has been growing at 80% per year.10 10 GSMA, 2012: “Mobile Signature in Turkey” Figure 3: Advantages of Mobile-based Identity
  • 6. Cartesian: Identity in the Internet Age Copyright © 2014 The Management Network Group, Inc. d/b/a Cartesian. All rights reserved. 5 MNOs and MVNOs are not the only players to be able to take advantage of mobile identity: the latest smartphones contain an embedded secure element, providing SIM-like security, beyond the control of the MNO. This creates opportunities for the likes of Apple, Google, Samsung and Microsoft to develop wider Identity Management capabilities. Identifying Opportunities For companies looking to monetise their assets beyond their historical core competency, then, Identity Management offers an intriguing strategic option: not only generating new revenue streams, but also increased customer loyalty and brand status. Financial institutions, government, and MNOs are all regarded as “trusted service providers”, and benefit from large user-bases and strong customer-service systems: the ideal foundations on which to build an Identity Management service. As an increasingly cynical consumer body becomes wary of ceding more control of their identities to media companies who track and monitor their actions to sell adverts, perhaps the world will look to today’s banks, governments, or phone operators to manage the next generation of identity.
  • 7. Cartesian is a specialist consulting firm of industry experts, focused exclusively on the communications, technology and digital media sector. For over 20 years, Cartesian has advised clients in strategy development and assisted them in execution against their goals. Our unique portfolio of professional services and managed solutions are tailored to the specific challenges faced by executives in these fast- moving industries. Combining strategic thinking and practical experience, we deliver superior results. Contact us to find out more about how our services can take your business forward in the Identity Management field:  Opportunity assessment: Customer insight, opportunity sizing, competitive assessment  Business case development: Financial modelling, entry option analysis, scenario planning  Go-to-market strategy: Market proposition, pricing, partner and distribution strategy  Technical execution: Business requirements, solutions design, implementation and assurance  Data analysis: Award-winning Ascertain® data analytics platform www.cartesian.com For further information, please contact us at cartesian@cartesian.com