Claims, Reputation and Behavioral Analysis of Online Identities

  • TYPE: Combined Session DATE: Thursday, May 07, 2009 TIME: 11:30-12:30 LOCATION: ANTARES

The goal of confirming an identity of a user remains a challenge in today’s online and offline worlds. To uphold the fundamental laws of identity that a subject is the same as itself: A ≡ A, different attributes of A must be known to discover A. There are several ways prevalent today. It includes word of mouth such as I know this user or he is who he claims to be, it also includes verifying an identity from trusted third parties like Governments, Certificate Authorities, etc.

The subject presents claims and those claims are used to match to known attributes. If these claims are issued by a trusted third party, they are verified offline or online with the third party. To know that the subject presenting claims is the unique subject, enough claims must be collected and matched with known attributes. The richer the sets of attributes about the subjects, and the increased number of claims the subject can possess, the better it is for the systems that can affirm the equation A ≡ A. Also to enhance this model further, it is essential to confirm these claims about ubjects against known attributes in real time. This will avoid TOC‐TOU errors.

Another dimension to this issue is the total number of claims the subject is presenting. Presenting all the possible claims explicitly, can lead to a bad and slow experience. E.g. In an online world, if a user is asked to enter his driver’s license, his redit card number, password, address, phone number, zip code every time he tries to access a web site, it will be a very unpleasant user experience.

In this presentation, we present how to enhance attributes about an subject that include reputation and behavior of the subject. The claims presented by subjects are transparent to the subject and yet it gives a richer set of attributes matching capabilites of the system.

For example, in an online world, behavioral characteristics include how user uses his system, which machines he uses to access he system, how he uses keyboards, mice, where he shops, what type of item he buys, etc. contrast usability/privacy/security properties of the proposal and tie that to user centric identities.

Log in to download presentations:  


Upendra Mardikar has over 17 years of experience holding senior management and chief technology positions in financial services and computer industries. With patents issued to his credit, Mardikar is an expert in Information and Application Security and has been a speaker at various industry...


Session Links


European Identity Conference 2009

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Ms. Bettina Buthmann
+49 211 23 70 77 23
  • May 05 - 08, 2009 Munich