inimitable identity
play

Inimitable Identity from reality to utopia Tarvi Martens SK, - PowerPoint PPT Presentation

Inimitable Identity from reality to utopia Tarvi Martens SK, Estonia Pride of E-stonia 10 years of successful ID-card history Population: 1.3 Mio Penetration: 1.15 Mio e-Used: > 0.5 Mio persons > 3.5 Mio authentications


  1. Inimitable Identity from reality to utopia Tarvi Martens SK, Estonia

  2. Pride of E-stonia • 10 years of successful ID-card history • Population: 1.3 Mio • Penetration: 1.15 Mio • e-Used: > 0.5 Mio persons • > 3.5 Mio authentications / month • > 3 Mio digital signatures / month • 25% of votes over Internet (2011) 28.03.2012 Tarvi Martens 2

  3. Personal info from the (e)ID First name and last name Personal Identification Code (PIC) 47302200234 pseudorandom+checksum Female born in 20th century Birth date: 20.02.1973 28.03.2012 Tarvi Martens 3

  4. Personal info over the X- Road 28.03.2012 Tarvi Martens 4

  5. X-Road explained Data Protection Inspectorate PIC,z,... PIC,y,... PIC,x,... X-Road Citizen Portal PIC,ö,... PIC,ü,... PIC,ä,... PIC,õ,... 28.03.2012 Tarvi Martens 5

  6. Desirable qualities of ID • Uniqueness and persistency  OK  Achieved via infologistics and biometry • User control and consent  So-so  Hopefully law and guardians function • Minimal disclosure  NOK  eID minimum: name+gender+birthdate • Role-based identity  NOK  Always a citizen • Anonymity and pseudonymity  So-so  Services exist but hardly used 28.03.2012 Tarvi Martens 6

  7. wet dreams of ideal identity management You is You and you can’t deny it 28.03.2012 Tarvi Martens 7

  8. Initable Identity defined • There exists a foolproof method of deriving a number (IID – inimitable identity) from biometric data. The number is:  100% unique in The World  As short as possible • The derivation process is under full control of the person IID method 28.03.2012 Tarvi Martens 8

  9. Challenges for “method” • Biometry today is not 100% foolproof  But combination of methods might help • Body cells are replaced in every 7 years  Persistency could be achieved via proxies? • It is hard to maintain the derivation process under full control of the person  Sometimes – like in medical emergencies – it is neccessary to invoke the “method” when the person is not in full control... 28.03.2012 Tarvi Martens 9

  10. Attribute Authority defined • Attributes are assigned to persons (IID-s) by Attribute Authorities (AA) in form of assertions which bind IID to specific a attribute • One assertion is binding IID with one attribute at a time to ensure granularity • Attribute is assigned to a person only with agreement and full control of this person or his/her parents/custodians 28.03.2012 Tarvi Martens 10

  11. Examples of assertions Assertion AA In control {IID,BirthDate} MoI / local gov. Your parents {IID,BirthPlace} MoI / local gov. Your parents {IID,Name} MoI / local gov. Your parents/You {IID,Citizenship} MoI / local gov. Your parents/You {IID,MatrialStatus} MoI / local gov. You + spouse {IID,AcademicDegree} University You {IID,BloodGroup} Hospital You (?) 28.03.2012 Tarvi Martens 11

  12. Rules for AA • AA-s are obliged to keep attribute history • AA-s are capable of giving out assertions in real-time  Person never carries assertions with him/her • AA-s give out only with permission of the IID owner  Exceptions apply: Some attributes need to be public by definition Some attributes should be available to authorities 28.03.2012 Tarvi Martens 12

  13. AA information • Information about AA-s shall be maintained by the government TSL Tag  Ref: Trusted Lists of QCP-s Scheme Information TSP[1] Information TSP Service[1] Information History[1] Information Services Signed TSL History[2] Information List of TSP-s TSP Service[2] Information History Information TSP[2] Information Service Information Signature 28.03.2012 Tarvi Martens 13

  14. Special AA - CSP • Certification Service Providers assign public keys to IID-s  A person can have multiple certificates • “permission to release an assertion” means: {My_IID,AAid,”Surname”,3rd_person_IID, time } e.g. “Say to the 3rd_person what my Surname was 10 years ago” 28.03.2012 Tarvi Martens 14

  15. Roles and Aliases • An AA can assign derived IID-s  {IID,IID’} – my second IID but cannot be derived directly from my biometrics  {IID,IID job } – my professional IID • Attributes can be asserted to derived IID-s  {IID’,Name} – my artist name  {IID job ,Public_Key} – my certificate for professional signing 28.03.2012 Tarvi Martens 15

  16. ID qualities in the IID World • Uniqueness and persistency  OK  Achieved via • User control and consent  OK  AA-s do keep secrets • Minimal disclosure  OK  Attribute assignment is granular • Role-based identity • Anonymity and pseudonymity  OK  Derived IID-s will do the job 28.03.2012 Tarvi Martens 16

  17. From Reality to Utopia • Step1: obsolete paper documents, start behaving as AA-s:  Open online service instead of issuing passports, marriage certificates, diplomas etc • Step2: work out the “method” of deriving IID from physical person  Hint: Aadhaar in India • Keep the direction in mind 28.03.2012 Tarvi Martens 17

  18. Thank You! tarvi@sk.ee 28.03.2012 Tarvi Martens 18

Recommend


More recommend