Identity by presence - take 2
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Identity by presence - take 2

on

  • 2,224 views

The normal method of electronic identification is to identity people by their labels. That is their name, their different forms of id or "their number". Identity by presence gives individuals a ...

The normal method of electronic identification is to identity people by their labels. That is their name, their different forms of id or "their number". Identity by presence gives individuals a different way to identify themselves electronically and that is to have a one or more representations of themselves in cyberspace so that they are identified by their presence. The approach is privacy friendly, inexpensive and changes the dynamics and possibilities for electronic communication and interaction. It makes - for example - id cards obsolete, enables secret electronic voting, brings responsibility to electronic communication while preserving anonymity.

Statistics

Views

Total Views
2,224
Views on SlideShare
2,189
Embed Views
35

Actions

Likes
2
Downloads
5
Comments
1

4 Embeds 35

http://anthillonline.com 30
http://www.katelundy.com.au 3
http://www.linkedin.com 1
https://www.linkedin.com 1

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • Neat. Probably not as easy as you make it sound (standards deployment time are non-trivial for co-ordinated distributed systems) but certainly the principles are in the right direction. Cheers, Pete.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Identity by presence - take 2 Presentation Transcript

  • 1. Identity by Presence Presented by Dr Kevin Cox Government 2.0: Policy & Practice for Australia
  • 2. Identification by data Dr Kevin Cox | Identity By Presence
  • 3. Identification by presence Dr Kevin Cox | Identity By Presence
  • 4. Secure identification with my epresence Dr Kevin Cox | Identity By Presence
  • 5. Different roles for your epresence Dr Kevin Cox | Identity By Presence
  • 6. greenID – the first epresence Dr Kevin Cox | Identity By Presence
  • 7. greenID verifies existing relationships Dr Kevin Cox | Identity By Presence
  • 8. A scholarship epresence Dr Kevin Cox | Identity By Presence
  • 9. A guardian epresence Dr Kevin Cox | Identity By Presence
  • 10. A health epresence Dr Kevin Cox | Identity By Presence
  • 11. Enforce existing privacy principles Dr Kevin Cox | Identity By Presence
  • 12. Cost comparison of health id By id card - $400M By epresence - $0 Dr Kevin Cox | Identity By Presence