Feeds

Private identities become a corporate focus

'It's going to get scarier'

Next gen security for virtualised datacentres

During the keynote kicking off the conference, Microsoft chief software architect Bill Gates told attendees that the company's next operating system will support just such a system. Dubbed InfoCard, the application will be part of Internet Explorer 7 and initially act as a password vault. However, as a companies start signing agreements of trust and build federated identity systems, InfoCard could hold credentials that prove only certain attributes, Gates said.

"You don't always want to present all your information," Gates said. "You will have different cards: Cards that just give your location, cards that are more secure that give your credit card (information), cards that you would protect very carefully and you would have a PIN for every use of it where you might authorise access of your medical information."

A Microsoft spokesperson stressed that the technology supports a system of credentials, but does not require it. Companies could continue to require customers to fully identify themselves, but the idea that less can be more has taken root, Gates said.

"Thinking of those different cards really has gotten people understanding that there are different types of authentication, and even in those authentication steps some cases have a level of indirection so you can have privacy even as you are doing those authorisation steps," he said.

The idea of a system of credentials that prove only what is really necessary is not a new one. Digital cash pioneers David Chaum and Stefan Brands both researched the topic in the 1990s. Brands created much of the framework for such technologies and has patented some of the models of credentials.

Consumers benefit from such systems because they give out less information and have to worry less about their privacy. Businesses can gain by having less information stored on their servers. Moreover, putting fewer barriers in the way of the customer will mean more business, vice president of online financial giant E*TRADE Bank Rob Shenk said during a panel on consumer authentication for the financial industry.

"Putting something in place that interdicts the legitimate flow is lethal, lethal," Shenk said.

Technology companies may be pushing for a change in how websites authenticate people, but it remains to be seen whether merchants will actually willingly settle for less information about their customers.

In any event, businesses and customers need to move beyond simple passwords linked to records of personal information, Microsoft's Gates said.

"Today we're using password systems and password systems simply won't cut it," Gates said. "They are very quickly becoming the weak link."

This article originally appeared in Security Focus.

Copyright © 2006, SecurityFocus

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?