SlideShare a Scribd company logo
1 of 22
1



ATTRIBUTE QUALITY ASSURED
AUTHENTICATION
Dr. Rachel O’Connell
GroovyFuture.com
2

WHO AM I?


PhD online criminal activity: implications for investigative strategies



Chief Security Officer Bebo, VP AOL



Research Consultant



Oxford Internet Institute:
 Effective Age Verification Techniques: Lessons to be Learnt from the Online
Gambling Industry



Ctrl_Shift

A market analyst and consulting: changing personal data landscape.



Member of OIX and the GSMA’s UK Assured legal working group



Advisor to commercial organisations on both the policy requirements and business
opportunities associated with digital and mobile ID



Co-founder of GroovyFuture.com.
3

KEY POINTS:


Traditional data sources for ID and age verification:





Increase in the number of data sources: Tipping point




Age is simply an attribute of identity: permissioned, quality assured attributes.

Age related attributes enable the following:







Artificial barriers
COPPA compliance

Improvements in customer acquisition and on-boarding processes
Uplift in, and/or generation of new revenue streams
Creation of new business development opportunities
Effective compliance with consumer protection and data protection regulation

Benefits to a number of business sectors including mobile operators, payment
providers, retailers, platform providers, digital media producers and advertisers-
4

TRADITIONAL ID AND AGE VERIFICATION
5

BELOW 18 YEARS


Guarantor model - leveraged traditional data sources



Burdensome compliance cost



Little or no elevation in assurance



Open to repudiation



Privacy concerns



No viable commercial or liability models



Not scalable, absence of standards



Not an effective means to mitigate risks



Barrier to innovation



View of a child online
6

EUROPEAN E-ID LANDSCAPE


Electronic ID cards exist in:
Belgium, Estonia, Finland, Germany, Italy, P
ortugal and Spain.



Other forms of e-ID, like citizen cards and
access tokens are used in: Austria, Czech
Republic, Denmark, Lithuania, Luxembourg
, The Netherlands, Slovakia, Slovenia and
Sweden.



17 EU countries also participate in a
project called STORK which has proven
that e-IDs can be safely recognised across
borders.

https://www.eid-stork.eu/index.php?option=com_processes&act=list_documents&s=1&Itemid=60&id=312
7

PRACTICAL APPLICATIONS


Austria and Iceland enable 'Safer Chat' for 1418 year olds where users need their e-ID card
to enter chat rooms for 14-18 year olds.



SaferChat has been tested as a platform for
safer online communication cross
borders, providing useful eID services for elearning.



Pilot can be taken as an illustration of attribute
based authentication with maximum data
protection.



Businesses or governmental organizations can
utilise this approach, adapting it for specific
purposes.



Open Source.
8

Scalability/Flexibility Various National Credentials

 The SaferChat pilot has proven to be very flexible in terms of

scalability, both smart cards and SIM cards are used to access pilot
applications.
 At the outset Icelandic and Austrian credentials were supported

 During pilot lifetime support for further cross border electronic

identities was added
(Estonia, Spain, Italy, Latvia, Luxembourg, Portugal, Slovenia and
Finland).
 ‘This could be done without any serious effort due to sufficiently

flexible and scalable STORK project specifications’.
9

STORK 2.0: AQAA
 Attribute Quality Authentication

Assurance (AQAA) framework
 Multiple Data Sources
 Business Needs /business rules
 Legal Framework
MINOR’S TRUST FRAMEWORK
11

DATA SOURCES
 IDaaS platform e.g. Avoco

Secure, provide a user centric
approach (SFA)

 Academic attribute providers: SAML
 International Student Card: Mobile ID

(pilot project)

 Banks – miicard

 Payments infrastructure –

Vocalink, Zapp
12

DATA SOURCES
 Government issued ID docs –
 Secure key
 OCR – ID Checker
 Digital Life Data – Trulioo
 Personal Data Empowerment Tools and

Services

 Biometrics

 Traditional data bureaus and CRA’s
13

BankID NORWAY


Age attributes accessible
Examples of when you can use BankID:











BankAxess (a new payment service for
online shopping)
Log-in and payment via internet bank
Change of address with the postal service
Placing a bid when buying property
Login on municipal websites
Purchasing units in equities funds

BankID can be used as an electronic proof
of identity, for example logging in at a
BankID user site.
DOB data was originally included so
students could avail of discounts.
14

ECONOMIC SOCIALISATION
15
16

BUSINESS NEEDS


COPPA 2.0 Email+


20%-40% SPAM FOLDER



Permissioned attributes



Spending limits



Diversity of product offerings



Shared devices

4.4 m -

2.7m

4.8 m
17

AGE GATING AND ENGAGEMENT ADVERTISING
18

EVOLUTION OF PARAMETERS
AGE VERIFICATION: 2008
Burdensome compliance cost
Little or no elevation in assurance

ATTRIBUTE QUALITY ASSURED: 2013
Business enabler / return on investment
Attribute Quality Authentication Assurance

Open to repudiation

Granular assurance / business rules

Privacy concerns

Privacy preserving, data minimisation principles

No viable commercial or liability models

Legal framework / scope for viable commercial
models
Trust frameworks /interoperable standards

Not scalable, absence of standards
Not effective personal safety risk
mitigation
Barrier to innovation

Augments security / business risk

View of children: passive, vulnerable

Active participant, economic socialisation,

Data Protection Act: Free market

Proposed DP: Human rights, Consumer Protection
Directive, Digital Agenda 2020

Foster innovation, product diversity, virtuous cycle
19

AQAA:VIRTUOUS CYCLE
Attribute
assurance
/token reuse within
ecosystem

Higher
sales, profit
margins
=Return on
investment

Consumer
satisfaction

Improved
service
delivery

Customer
loyalty

Customer
satisfaction

Regulatory
compliance
20

BUSINESS ENABLER


A greater variety of data sources will be accessible and
permissioned, these can be cross checked and combined to
meet specific business rules.

Higher levels of customer acquisition














Remote on-boarding
Seamless customer experience

Trust elevation – LOA’s, as per business rules
Low integration costs
Modular, highly configurable
Scalable, viable low cost
Reusable tokens
UX
Reputation, foster brand loyalty

Challenges: Cross sectorial consensus, time
frames, information security, Information
security, managing the processes of
accreditation, oversight, redress
21

 Thank You
 rachel@technologist.com
 Twitter: @racheloconnell

 www.GroovyFuture.com
22

More Related Content

What's hot

Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsNaveed Zahoor
 
Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerceyham manansala
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content RegulationEndcode_org
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018Dan Storbaek
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-BusinessEyad Almasri
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesPalani Kumar
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
E commerce class 2
E commerce class 2E commerce class 2
E commerce class 2Anne ndolo
 
Fintech Simplified
Fintech SimplifiedFintech Simplified
Fintech SimplifiediHashmi ...
 

What's hot (19)

E commerce - ppt
E   commerce  - ppt E   commerce  - ppt
E commerce - ppt
 
Electronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systemsElectronic and mobile commerce and enterprise systems
Electronic and mobile commerce and enterprise systems
 
Electronic and mobile commerce
Electronic and mobile commerceElectronic and mobile commerce
Electronic and mobile commerce
 
IAB Online Content Regulation
IAB Online Content RegulationIAB Online Content Regulation
IAB Online Content Regulation
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
Trends in legal tech 2018
Trends in legal tech 2018Trends in legal tech 2018
Trends in legal tech 2018
 
E-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital GoodsE-Commerce: Digital Markets, Digital Goods
E-Commerce: Digital Markets, Digital Goods
 
National identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernmentNational identity schemes - digital identity - national ID - eGovernment
National identity schemes - digital identity - national ID - eGovernment
 
Iti
ItiIti
Iti
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
 
Fintech.
Fintech.Fintech.
Fintech.
 
Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)Ch08 c electronic and mobile commerce a (2)
Ch08 c electronic and mobile commerce a (2)
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Nxtd
NxtdNxtd
Nxtd
 
Iti
ItiIti
Iti
 
E commerce class 2
E commerce class 2E commerce class 2
E commerce class 2
 
Fintech Simplified
Fintech SimplifiedFintech Simplified
Fintech Simplified
 
E-Commerce
 E-Commerce E-Commerce
E-Commerce
 

Similar to 5 nov gsma_eema

BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...apidays
 
How a Top Bank Improved Customer Experience Through Digital Transformation
How a Top Bank Improved Customer Experience Through Digital TransformationHow a Top Bank Improved Customer Experience Through Digital Transformation
How a Top Bank Improved Customer Experience Through Digital TransformationNuxeo
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationFTx Identity
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 FinTech Belgium
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​Gigya
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Surveyadremllc
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit123
 
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptxThe-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptxkhalidkhan507008
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechFinTech Consortium
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of ThingsForgeRock
 
Identity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxIdentity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxrpacpc
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
Dictao Company Presentation
Dictao Company PresentationDictao Company Presentation
Dictao Company PresentationDictao
 

Similar to 5 nov gsma_eema (20)

SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
 
How a Top Bank Improved Customer Experience Through Digital Transformation
How a Top Bank Improved Customer Experience Through Digital TransformationHow a Top Bank Improved Customer Experience Through Digital Transformation
How a Top Bank Improved Customer Experience Through Digital Transformation
 
The Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity VerificationThe Future of Biometrics, Transforming Age and Identity Verification
The Future of Biometrics, Transforming Age and Identity Verification
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
Identity Trust Framework Survey
Identity Trust Framework SurveyIdentity Trust Framework Survey
Identity Trust Framework Survey
 
Open Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital IdentityOpen Identity Exchange - the Global Growth of Digital Identity
Open Identity Exchange - the Global Growth of Digital Identity
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptxThe-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
The-Customer-Loyalty-Program-The-Mobile-App-Your-Data-and-You.pptx
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTech
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
Identity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxIdentity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docx
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Mini Project- Shopping Cart Development
Mini Project- Shopping Cart DevelopmentMini Project- Shopping Cart Development
Mini Project- Shopping Cart Development
 
Dictao Company Presentation
Dictao Company PresentationDictao Company Presentation
Dictao Company Presentation
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

5 nov gsma_eema

  • 1. 1  ATTRIBUTE QUALITY ASSURED AUTHENTICATION Dr. Rachel O’Connell GroovyFuture.com
  • 2. 2 WHO AM I?  PhD online criminal activity: implications for investigative strategies  Chief Security Officer Bebo, VP AOL  Research Consultant  Oxford Internet Institute:  Effective Age Verification Techniques: Lessons to be Learnt from the Online Gambling Industry  Ctrl_Shift  A market analyst and consulting: changing personal data landscape.  Member of OIX and the GSMA’s UK Assured legal working group  Advisor to commercial organisations on both the policy requirements and business opportunities associated with digital and mobile ID  Co-founder of GroovyFuture.com.
  • 3. 3 KEY POINTS:  Traditional data sources for ID and age verification:    Increase in the number of data sources: Tipping point   Age is simply an attribute of identity: permissioned, quality assured attributes. Age related attributes enable the following:      Artificial barriers COPPA compliance Improvements in customer acquisition and on-boarding processes Uplift in, and/or generation of new revenue streams Creation of new business development opportunities Effective compliance with consumer protection and data protection regulation Benefits to a number of business sectors including mobile operators, payment providers, retailers, platform providers, digital media producers and advertisers-
  • 4. 4 TRADITIONAL ID AND AGE VERIFICATION
  • 5. 5 BELOW 18 YEARS  Guarantor model - leveraged traditional data sources  Burdensome compliance cost  Little or no elevation in assurance  Open to repudiation  Privacy concerns  No viable commercial or liability models  Not scalable, absence of standards  Not an effective means to mitigate risks  Barrier to innovation  View of a child online
  • 6. 6 EUROPEAN E-ID LANDSCAPE  Electronic ID cards exist in: Belgium, Estonia, Finland, Germany, Italy, P ortugal and Spain.  Other forms of e-ID, like citizen cards and access tokens are used in: Austria, Czech Republic, Denmark, Lithuania, Luxembourg , The Netherlands, Slovakia, Slovenia and Sweden.  17 EU countries also participate in a project called STORK which has proven that e-IDs can be safely recognised across borders. https://www.eid-stork.eu/index.php?option=com_processes&act=list_documents&s=1&Itemid=60&id=312
  • 7. 7 PRACTICAL APPLICATIONS  Austria and Iceland enable 'Safer Chat' for 1418 year olds where users need their e-ID card to enter chat rooms for 14-18 year olds.  SaferChat has been tested as a platform for safer online communication cross borders, providing useful eID services for elearning.  Pilot can be taken as an illustration of attribute based authentication with maximum data protection.  Businesses or governmental organizations can utilise this approach, adapting it for specific purposes.  Open Source.
  • 8. 8 Scalability/Flexibility Various National Credentials  The SaferChat pilot has proven to be very flexible in terms of scalability, both smart cards and SIM cards are used to access pilot applications.  At the outset Icelandic and Austrian credentials were supported  During pilot lifetime support for further cross border electronic identities was added (Estonia, Spain, Italy, Latvia, Luxembourg, Portugal, Slovenia and Finland).  ‘This could be done without any serious effort due to sufficiently flexible and scalable STORK project specifications’.
  • 9. 9 STORK 2.0: AQAA  Attribute Quality Authentication Assurance (AQAA) framework  Multiple Data Sources  Business Needs /business rules  Legal Framework
  • 11. 11 DATA SOURCES  IDaaS platform e.g. Avoco Secure, provide a user centric approach (SFA)  Academic attribute providers: SAML  International Student Card: Mobile ID (pilot project)  Banks – miicard  Payments infrastructure – Vocalink, Zapp
  • 12. 12 DATA SOURCES  Government issued ID docs –  Secure key  OCR – ID Checker  Digital Life Data – Trulioo  Personal Data Empowerment Tools and Services  Biometrics  Traditional data bureaus and CRA’s
  • 13. 13 BankID NORWAY  Age attributes accessible Examples of when you can use BankID:         BankAxess (a new payment service for online shopping) Log-in and payment via internet bank Change of address with the postal service Placing a bid when buying property Login on municipal websites Purchasing units in equities funds BankID can be used as an electronic proof of identity, for example logging in at a BankID user site. DOB data was originally included so students could avail of discounts.
  • 15. 15
  • 16. 16 BUSINESS NEEDS  COPPA 2.0 Email+  20%-40% SPAM FOLDER  Permissioned attributes  Spending limits  Diversity of product offerings  Shared devices 4.4 m - 2.7m 4.8 m
  • 17. 17 AGE GATING AND ENGAGEMENT ADVERTISING
  • 18. 18 EVOLUTION OF PARAMETERS AGE VERIFICATION: 2008 Burdensome compliance cost Little or no elevation in assurance ATTRIBUTE QUALITY ASSURED: 2013 Business enabler / return on investment Attribute Quality Authentication Assurance Open to repudiation Granular assurance / business rules Privacy concerns Privacy preserving, data minimisation principles No viable commercial or liability models Legal framework / scope for viable commercial models Trust frameworks /interoperable standards Not scalable, absence of standards Not effective personal safety risk mitigation Barrier to innovation Augments security / business risk View of children: passive, vulnerable Active participant, economic socialisation, Data Protection Act: Free market Proposed DP: Human rights, Consumer Protection Directive, Digital Agenda 2020 Foster innovation, product diversity, virtuous cycle
  • 19. 19 AQAA:VIRTUOUS CYCLE Attribute assurance /token reuse within ecosystem Higher sales, profit margins =Return on investment Consumer satisfaction Improved service delivery Customer loyalty Customer satisfaction Regulatory compliance
  • 20. 20 BUSINESS ENABLER  A greater variety of data sources will be accessible and permissioned, these can be cross checked and combined to meet specific business rules.  Higher levels of customer acquisition           Remote on-boarding Seamless customer experience Trust elevation – LOA’s, as per business rules Low integration costs Modular, highly configurable Scalable, viable low cost Reusable tokens UX Reputation, foster brand loyalty Challenges: Cross sectorial consensus, time frames, information security, Information security, managing the processes of accreditation, oversight, redress
  • 21. 21  Thank You  rachel@technologist.com  Twitter: @racheloconnell  www.GroovyFuture.com
  • 22. 22

Editor's Notes

  1. The Avoco IDP is both user-centric and privacy enabled. Underpinning the capability to scale and handle large volumes of transactions is an architecture that incorporates much of what has been learnt from social networking systems that have the ability to handle a billion identities. This avoids the limiting factors, that are prevalent in Enterprise identity systems, which have been adapted to try and deliver consumer mass market identity. Avoco offer several variants of Identity Provider Platforms. Each enables you to issue and manage online digital identities which are user centric, privacy enabled, simple to deploy in the cloud, or a local network, totally customisable and scalable to millions of users. Information Card (WS- Trust), Saml and OpenID digital identities are all supported by Avoco identity services. These services are based on an attribute/claims based architecture. The issued identities can be used with many types of credential including social network federated login, digital certificates, Mobile phone SMS text, username and password, etc. A service to issue and manage online digital identities that can then be used to access online services, secure documents and sign HTML web forms.Avoco Secure is an innovation company whose areas of focus are solutions for cloud identity, security, and privacy. Using an Avoco identity, you can access online services from iPads, mobile phones, PCs etc. in a simple, secure and easy to use way. Users can seamlessly log in and send data to online services. This is done in a secure manner that both mirrors and extends their everyday experience with social networks and webmail. Avoco solutions are user centric, enhanced by security and incorporate privacy by design.Vocalink study: Younger adults are especially likely to be mobile payment users (41% of 16 to 24 year olds), and around half of those who are not already using the service are interested in doing so.