Feeds

Private identities become a corporate focus

'It's going to get scarier'

The Essential Guide to IT Transformation

During the keynote kicking off the conference, Microsoft chief software architect Bill Gates told attendees that the company's next operating system will support just such a system. Dubbed InfoCard, the application will be part of Internet Explorer 7 and initially act as a password vault. However, as a companies start signing agreements of trust and build federated identity systems, InfoCard could hold credentials that prove only certain attributes, Gates said.

"You don't always want to present all your information," Gates said. "You will have different cards: Cards that just give your location, cards that are more secure that give your credit card (information), cards that you would protect very carefully and you would have a PIN for every use of it where you might authorise access of your medical information."

A Microsoft spokesperson stressed that the technology supports a system of credentials, but does not require it. Companies could continue to require customers to fully identify themselves, but the idea that less can be more has taken root, Gates said.

"Thinking of those different cards really has gotten people understanding that there are different types of authentication, and even in those authentication steps some cases have a level of indirection so you can have privacy even as you are doing those authorisation steps," he said.

The idea of a system of credentials that prove only what is really necessary is not a new one. Digital cash pioneers David Chaum and Stefan Brands both researched the topic in the 1990s. Brands created much of the framework for such technologies and has patented some of the models of credentials.

Consumers benefit from such systems because they give out less information and have to worry less about their privacy. Businesses can gain by having less information stored on their servers. Moreover, putting fewer barriers in the way of the customer will mean more business, vice president of online financial giant E*TRADE Bank Rob Shenk said during a panel on consumer authentication for the financial industry.

"Putting something in place that interdicts the legitimate flow is lethal, lethal," Shenk said.

Technology companies may be pushing for a change in how websites authenticate people, but it remains to be seen whether merchants will actually willingly settle for less information about their customers.

In any event, businesses and customers need to move beyond simple passwords linked to records of personal information, Microsoft's Gates said.

"Today we're using password systems and password systems simply won't cut it," Gates said. "They are very quickly becoming the weak link."

This article originally appeared in Security Focus.

Copyright © 2006, SecurityFocus

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.