SlideShare a Scribd company logo
1 of 19
   To create Universal Identity Management.
   To incorporate existing Identity Management systems
    together.
   To provide a new option for anonymous or temporary users
    for login to others system with their permissions.
   To provide different layers of access.
   Propose our model for WS Federation to implement.
 How you will provide level of access?
                                      .
 Where you will apply this concept?
                                                                  .
 What technologies are used to produce the anonymous credentials?


   What are the main advantage of your projects?
 User-centric identity management is used for identifying users to
  use a system.
 Relationship-focused and Credential-focused identity management
  are used.
 In the Relationship-focused identity management system the user
  only adopts identity providers to provide identity information and
  has control over his attributes.
 The Credential-focused approach long-term credentials from
  identity providers and stores them locally.
 Therefore, the user participates in every identity provisioning
  transaction.
 This system will take time for authentication.


   User need to keep separate credentials for separate systems.

   Chance for forgetting the credentials.
 Universal identity management model.
 A universal identity management system incorporates the
  advantages of both the user-centric system types to address the
  issues.
 It requires only a single credential to all system for a user.
 Anonymous credentials can be used which provides the delegation of
  anonymous credentials and combines identity metasystem .
 Identity Meta system helps to incorporate existing identity
  systems together.
 Less time requirements.
 No data loss.
 High security.
 Easy to use.
 Transparent security
HOSPITAL SYSTEM
                                                5.ACCESS
                 1.USER ID AND PASSWORD         THE
                                                DOMAIN


       PHARAMACY MAN                                       PHARAMACY
                                  DOCTOR                     SYSTEM



2.STORES U&P

                              4.GIVE IT TO TP

          DATABASE    3.CONVERT U&P TO                      MEDICINE
                      ANONYMOUS                            AVAILABILITY
25%
 SERVICES
 DELGATION SYSTEM
 SESSION TRACKING SYSTEM
 ANONYMOUS CRDENTIAL CONVERSION
Universal Identity Management Model Based on Anonymous Credentilals

More Related Content

Similar to Universal Identity Management Model Based on Anonymous Credentilals

The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model final
tomcook8
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
Chris Reese
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 

Similar to Universal Identity Management Model Based on Anonymous Credentilals (20)

Hospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptxHospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptx
 
Identity Managment
Identity ManagmentIdentity Managment
Identity Managment
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
 
Existing system
Existing systemExisting system
Existing system
 
Hospital AES computer science networks.pptx
Hospital AES computer science networks.pptxHospital AES computer science networks.pptx
Hospital AES computer science networks.pptx
 
Hospital AES.pptx
Hospital AES.pptxHospital AES.pptx
Hospital AES.pptx
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporation
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model final
 
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
 
Software specification for
Software specification forSoftware specification for
Software specification for
 
Needs for mis
Needs for misNeeds for mis
Needs for mis
 
Expert system
Expert systemExpert system
Expert system
 
amit.pj2.pptx
amit.pj2.pptxamit.pj2.pptx
amit.pj2.pptx
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
online patient treatment system
online patient treatment system online patient treatment system
online patient treatment system
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Universal Identity Management Model Based on Anonymous Credentilals

  • 1.
  • 2. To create Universal Identity Management.  To incorporate existing Identity Management systems together.  To provide a new option for anonymous or temporary users for login to others system with their permissions.  To provide different layers of access.  Propose our model for WS Federation to implement.
  • 3.  How you will provide level of access? .  Where you will apply this concept? .  What technologies are used to produce the anonymous credentials?  What are the main advantage of your projects?
  • 4.  User-centric identity management is used for identifying users to use a system.  Relationship-focused and Credential-focused identity management are used.  In the Relationship-focused identity management system the user only adopts identity providers to provide identity information and has control over his attributes.  The Credential-focused approach long-term credentials from identity providers and stores them locally.
  • 5.  Therefore, the user participates in every identity provisioning transaction.  This system will take time for authentication.  User need to keep separate credentials for separate systems.  Chance for forgetting the credentials.
  • 6.  Universal identity management model.  A universal identity management system incorporates the advantages of both the user-centric system types to address the issues.  It requires only a single credential to all system for a user.  Anonymous credentials can be used which provides the delegation of anonymous credentials and combines identity metasystem .
  • 7.  Identity Meta system helps to incorporate existing identity systems together.  Less time requirements.  No data loss.  High security.  Easy to use.  Transparent security
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. HOSPITAL SYSTEM 5.ACCESS 1.USER ID AND PASSWORD THE DOMAIN PHARAMACY MAN PHARAMACY DOCTOR SYSTEM 2.STORES U&P 4.GIVE IT TO TP DATABASE 3.CONVERT U&P TO MEDICINE ANONYMOUS AVAILABILITY
  • 14. 25%
  • 15.
  • 16.
  • 17.
  • 18.  SERVICES  DELGATION SYSTEM  SESSION TRACKING SYSTEM  ANONYMOUS CRDENTIAL CONVERSION