SlideShare a Scribd company logo
1 of 19
   To create Universal Identity Management.
   To incorporate existing Identity Management systems
    together.
   To provide a new option for anonymous or temporary users
    for login to others system with their permissions.
   To provide different layers of access.
   Propose our model for WS Federation to implement.
 How you will provide level of access?
                                      .
 Where you will apply this concept?
                                                                  .
 What technologies are used to produce the anonymous credentials?


   What are the main advantage of your projects?
 User-centric identity management is used for identifying users to
  use a system.
 Relationship-focused and Credential-focused identity management
  are used.
 In the Relationship-focused identity management system the user
  only adopts identity providers to provide identity information and
  has control over his attributes.
 The Credential-focused approach long-term credentials from
  identity providers and stores them locally.
 Therefore, the user participates in every identity provisioning
  transaction.
 This system will take time for authentication.


   User need to keep separate credentials for separate systems.

   Chance for forgetting the credentials.
 Universal identity management model.
 A universal identity management system incorporates the
  advantages of both the user-centric system types to address the
  issues.
 It requires only a single credential to all system for a user.
 Anonymous credentials can be used which provides the delegation of
  anonymous credentials and combines identity metasystem .
 Identity Meta system helps to incorporate existing identity
  systems together.
 Less time requirements.
 No data loss.
 High security.
 Easy to use.
 Transparent security
HOSPITAL SYSTEM
                                                5.ACCESS
                 1.USER ID AND PASSWORD         THE
                                                DOMAIN


       PHARAMACY MAN                                       PHARAMACY
                                  DOCTOR                     SYSTEM



2.STORES U&P

                              4.GIVE IT TO TP

          DATABASE    3.CONVERT U&P TO                      MEDICINE
                      ANONYMOUS                            AVAILABILITY
25%
 SERVICES
 DELGATION SYSTEM
 SESSION TRACKING SYSTEM
 ANONYMOUS CRDENTIAL CONVERSION
Universal Identity Management Model Based on Anonymous Credentilals

More Related Content

Similar to Universal Identity Management Model Based on Anonymous Credentilals

The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model final
tomcook8
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
Chris Reese
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 

Similar to Universal Identity Management Model Based on Anonymous Credentilals (20)

Hospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptxHospital mnagement system presentation.pptx
Hospital mnagement system presentation.pptx
 
Identity Managment
Identity ManagmentIdentity Managment
Identity Managment
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
 
Existing system
Existing systemExisting system
Existing system
 
Hospital AES computer science networks.pptx
Hospital AES computer science networks.pptxHospital AES computer science networks.pptx
Hospital AES computer science networks.pptx
 
Hospital AES.pptx
Hospital AES.pptxHospital AES.pptx
Hospital AES.pptx
 
Online compliant response system for corporation
Online compliant response system for corporationOnline compliant response system for corporation
Online compliant response system for corporation
 
Conceptual model final
Conceptual model finalConceptual model final
Conceptual model final
 
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
[WSO2Con USA 2018] The Power of One: Bringing Single User Design into the Hea...
 
aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
 
Software specification for
Software specification forSoftware specification for
Software specification for
 
Needs for mis
Needs for misNeeds for mis
Needs for mis
 
Expert system
Expert systemExpert system
Expert system
 
amit.pj2.pptx
amit.pj2.pptxamit.pj2.pptx
amit.pj2.pptx
 
Patient Privacy Control for Health Care in Cloud Computing System
Patient Privacy Control for Health Care in Cloud Computing  SystemPatient Privacy Control for Health Care in Cloud Computing  System
Patient Privacy Control for Health Care in Cloud Computing System
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
online patient treatment system
online patient treatment system online patient treatment system
online patient treatment system
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Access Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network RelationshipsAccess Policy Management For OSN Using Network Relationships
Access Policy Management For OSN Using Network Relationships
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Universal Identity Management Model Based on Anonymous Credentilals

  • 1.
  • 2. To create Universal Identity Management.  To incorporate existing Identity Management systems together.  To provide a new option for anonymous or temporary users for login to others system with their permissions.  To provide different layers of access.  Propose our model for WS Federation to implement.
  • 3.  How you will provide level of access? .  Where you will apply this concept? .  What technologies are used to produce the anonymous credentials?  What are the main advantage of your projects?
  • 4.  User-centric identity management is used for identifying users to use a system.  Relationship-focused and Credential-focused identity management are used.  In the Relationship-focused identity management system the user only adopts identity providers to provide identity information and has control over his attributes.  The Credential-focused approach long-term credentials from identity providers and stores them locally.
  • 5.  Therefore, the user participates in every identity provisioning transaction.  This system will take time for authentication.  User need to keep separate credentials for separate systems.  Chance for forgetting the credentials.
  • 6.  Universal identity management model.  A universal identity management system incorporates the advantages of both the user-centric system types to address the issues.  It requires only a single credential to all system for a user.  Anonymous credentials can be used which provides the delegation of anonymous credentials and combines identity metasystem .
  • 7.  Identity Meta system helps to incorporate existing identity systems together.  Less time requirements.  No data loss.  High security.  Easy to use.  Transparent security
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. HOSPITAL SYSTEM 5.ACCESS 1.USER ID AND PASSWORD THE DOMAIN PHARAMACY MAN PHARAMACY DOCTOR SYSTEM 2.STORES U&P 4.GIVE IT TO TP DATABASE 3.CONVERT U&P TO MEDICINE ANONYMOUS AVAILABILITY
  • 14. 25%
  • 15.
  • 16.
  • 17.
  • 18.  SERVICES  DELGATION SYSTEM  SESSION TRACKING SYSTEM  ANONYMOUS CRDENTIAL CONVERSION