Claims, Reputation and Behavioral Analysis of Online Identities
Facebook Twitter LinkedIn

Claims, Reputation and Behavioral Analysis of Online Identities

Combined Session
Thursday, May 07, 2009 11:30—12:30
Location: ANTARES

The goal of confirming an identity of a user remains a challenge in today’s online and offline worlds. To uphold the fundamental laws of identity that a subject is the same as itself: A ≡ A, different attributes of A must be known to discover A. There are several ways prevalent today. It includes word of mouth such as I know this user or he is who he claims to be, it also includes verifying an identity from trusted third parties like Governments, Certificate Authorities, etc.

The subject presents claims and those claims are used to match to known attributes. If these claims are issued by a trusted third party, they are verified offline or online with the third party. To know that the subject presenting claims is the unique subject, enough claims must be collected and matched with known attributes. The richer the sets of attributes about the subjects, and the increased number of claims the subject can possess, the better it is for the systems that can affirm the equation A ≡ A. Also to enhance this model further, it is essential to confirm these claims about ubjects against known attributes in real time. This will avoid TOC‐TOU errors.

Another dimension to this issue is the total number of claims the subject is presenting. Presenting all the possible claims explicitly, can lead to a bad and slow experience. E.g. In an online world, if a user is asked to enter his driver’s license, his redit card number, password, address, phone number, zip code every time he tries to access a web site, it will be a very unpleasant user experience.

In this presentation, we present how to enhance attributes about an subject that include reputation and behavior of the subject. The claims presented by subjects are transparent to the subject and yet it gives a richer set of attributes matching capabilites of the system.

For example, in an online world, behavioral characteristics include how user uses his system, which machines he uses to access he system, how he uses keyboards, mice, where he shops, what type of item he buys, etc. contrast usability/privacy/security properties of the proposal and tie that to user centric identities.

Claims, Reputation and Behavioral Analysis of Online Identities
Presentation deck
Claims, Reputation and Behavioral Analysis of Online Identities
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Liam Lynch
Liam Lynch
eBay Inc.
Liam joined eBay in May of 2002, where he was Security Architect in the Architecture group. He served as Chief Security Architect for eBay marketplaces and consulted for marketplaces adjacencies....
Upendra Mardikar
Upendra Mardikar
PayPal
Upendra Mardikar has over 17 years of experience holding senior management and chief technology positions in financial services and computer industries. With patents issued to his credit, Mardikar...
Subscribe for updates
Please provide your email address