CIS14: Persistent Trusted Identity

12
Karl Martin, CEO @KarlTheMartian

description

Karl Martin, Bionym How new advances in persistent trusted identity are opening up a world of applications beyond security and into the Internet of Things, to enable hyper-personlized user experiences in addition to frictionless, persistent identity verification for security purposes.

Transcript of CIS14: Persistent Trusted Identity

Page 1: CIS14: Persistent Trusted Identity

Karl Martin, CEO @KarlTheMartian

Page 2: CIS14: Persistent Trusted Identity

Thank You

2

Consumer Authentication Today

Things You Know -  Passwords -  PINs -  Passphrases -  Inane security

questions

Things You Have -  Keys -  Cards -  Electronic tokens

Who you are -  Fingerprint -  Face -  Voice -  Iris

Page 3: CIS14: Persistent Trusted Identity

Thank You

3

Biometrics are the Silver Bullet?

The security world has been looking to biometrics to solve its security vs. convenience problem

But, fundamental technological limitations are quickly

reached

The problem is further exacerbated by fickle consumers and uncontrolled operating environments

Page 4: CIS14: Persistent Trusted Identity

Thank You

4

Reframing the Problem

We cannot completely eliminate the friction associated with fundamental human authentication processes

The problem lies not just in the friction, but in the frequency:

burden = friction x frequency

How can we instead reduce the frequency?

Page 5: CIS14: Persistent Trusted Identity

Thank You

5

Changing the Authentication Paradigm

The fundamental problem is now with the forced synchronicity: authentication at the point of transaction

How can we decouple action required for authentication

from the transaction that uses it?

Redesign the system to achieve asynchronicity

Page 6: CIS14: Persistent Trusted Identity

Thank You

6

Seamless, persistent sensing

Wearable Technology – Distilled

Low power, wireless communication

Fitness and health?

Asynchronicity of: signals – insight – action

Page 7: CIS14: Persistent Trusted Identity

Thank You

The Redesigned Authentication System

Establish a high level of trust using multiple factors

Leverage persistent sensing to maintain that trust without further user interaction

Use a trusted device to seamlessly serve credentials

without requiring any user interaction

Page 8: CIS14: Persistent Trusted Identity

Thank You

8

Identity Is Now Easy – So Now What?

Authentication is not just a security problem, it’s a general identity problem

By making identity easy, the scope of identity-focused

applications significantly broadens

Smart devices have a new context in which to operate

Page 9: CIS14: Persistent Trusted Identity

Thank You

9

New Context for Internet of Things

The Internet of Things is about persistent connectivity and sensing

Sensing can provide situational context to make smart

things smarter

But, where user interaction is involved, identity is the ultimate context

Page 10: CIS14: Persistent Trusted Identity

Thank You

10

Privacy Must Be At the Forefront

Privacy is not about secrecy: Privacy = Control

By decoupling human action from authentication, greater

trust us placed upon the system

Privacy by Design (www.privacybydesign.ca)

Page 11: CIS14: Persistent Trusted Identity

Thank You

11

The Context for Internet of Things

Identity has been the missing context for IoT devices

The prospect is profound: if every device, environment, and service provider knew the identities of those nearby, how

would they behave differently

We are entering the era of hyper-personalization

Page 12: CIS14: Persistent Trusted Identity

Thank You

12

getnymi.com