Anette Offenberger
“Origin” Use Control “End”Origin identity
Use Identity
Control Identity
End Identity
Registration
Documents
Processes
Instruments
Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal 9
Identity InfrastructureIdentity Infrastructure
“Origin” Use Control “End”
Integrity of the MRTD issuance process: Mr Gary McDonald
Origin identity
Use Identity
Control Identity
End Identity
Registration
Documents
Processes
Instruments
Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal 10
Identity InfrastructureIdentity Infrastructure
“Origin” Use Control “End”
Civil registries: Mr. (...) Barry Kefauver
Origin identity
Use Identity
Control Identity
End Identity
Registration
Documents
Processes
Instruments
Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal 12
Identity InfrastructureIdentity Infrastructure
“Origin” Use Control “End”
Combating document fraud: Mr. (...) Dwight MacManus
Origin identity
Use Identity
Control Identity
End Identity
Registration
Documents
Processes
Instruments
Sixth Symposium and Exhibition on ICAO MRTDs, Biometrics and Security Standards, 1 to 4 November 2010, Montréal 14
Identity InfrastructureIdentity Infrastructure Travel documents assessment: Mr.
Language:English
Score: 774603.2
-
https://www.icao.int/Meetings/...2010/Documentation/Knopjes.pdf
Data Source: un
In this presentation, we explain an identity management framework for NGN, and introduce a concept "identity convergence" that builds bridges between isolated user identities on different platforms and filters identity information when crossing the bridges. (...) These new identities are feeding back into the world of social and business affairs, offering a mix of plural identities and challenging traditional notions of identity. (...) Speaker:
Hal LOCKHART , OASIS
Session:
5 - Standards Activities on Digital Identities
Title of Presentation: Federated Identity Standards at OASIS
A number of technical committees at OASIS have developed specifications relevant to Digital Identity in general and Identity Federation in particular.
Language:English
Score: 768724.37
-
https://www.itu.int/ITU-T/worksem/ngn/200612/abstracts.html
Data Source: un
Isolated Identity When the extensibility is low or non-existent in a given application centric identity system, it is effectively isolated from all other applications.
(...) Problems
different regulations regarding accounting, auditing and privacy across the world proper backup and disaster recovery integration of users other identities, e.g. in private life etc.
User Centric Identity User centric identity systems (such as e.g. (...) International Telecommunication
Union
Identity Domains Technologies Higgins - an extensible, platform-independent, identity protocol-independent, software framework to support existing and new applications that give users more convenience, privacy and control over their identity information.
Language:English
Score: 767916.5
-
https://www.itu.int/dms_pub/it.../15/04/T15040000020001PDFE.pdf
Data Source: un
Identity Convergence for NGN
ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006
International Telecommunication Union ITU-T
Identity Convergence for Identity Convergence for NGN Platform and BusinessNGN Platform and Business
Hidehito Gomi Identity Architect, NEC Corporation
ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 2
ITU-T
Outline
o Existing IdM Framework on the Internet o IdM Framework for NGN o Identity Fragmentation o IdM Requirements for NGN o Identity Convergence o Technologies for Identity Convergence
• Group Signature • Context Obfuscation • Privacy Policy Negotiation
o NGN Business based on IdM o Summary
ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 3
ITU-T
Existing IdM Framework on the Internet
o SAML models roles of entities and interactions between them
PEP (Policy Enforcement Point)
Registration/ AuthN Req.
(...) Service/network access
Partner Operators
ISPEnterprise
Publication of Certificates
(AuthN, Attributes) Verification
Issuance of Certificates
Users
Delegation Req. of Identity related services
Identity Related Services Such as Charging/billing
IdP (Identity Provider)
Network services
ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 5
ITU-T
Identity Fragmentation
o So far, identity info of a user is distributed & duplicated among different platforms, therefore • There is need to have multiple sign-on procedures for a wide
range of services. • It is difficult to make good use of user’s identity info (trail,
presence, geo-location) across different platforms. • It is troublesome for users to provide, retrieve and update all
privacy info managed at each platform separately.
(...) Identity Convergence for NGN Platform and Business
Outline
Existing IdM Framework on the Internet
IdM Framework for NGN
Identity Fragmentation
IdM Requirements for NGN
Identity Convergence
Technologies for Identity Convergence
Group Signature
Context Obfuscation
Privacy Policy Negotiation
NGN Business based on IdM
Summary
Language:English
Score: 767171.83
-
https://www.itu.int/dms_pub/it.../06/04/T06040020010001PDFE.pdf
Data Source: un
Page 148 - The Digital Financial Services (DFS) Ecosystem
Basic HTML Version
Table of Contents
View Full Version
Page 148 - The Digital Financial Services (DFS) Ecosystem
P. 148
ITU-T Focus Group Digital Financial Services Ecosystem 3 2 4 1 National Identity Management Commission, 2015, MasterCard, n.d., Ibid, Business Day, 2015, Udunze, 2015, National 6 5 7 8 9 Identity Management Commission, 2015, MasterCard, n.d., National Identity Management Commission, 2007, 2013 conver- 10 12 11 13 sion rates, National Identity Management Commission, 2013, Ibid., Ibid., National Identity Management Commission, 15 16 2013, National Identity Management Commission, 2015, Business Day, 2015, National Identity Management Commission, 14 18 17 19 2015, National Identity Management Commission, n.d., National Identity Management Commission, 2015, MasterCard, 21 22 n.d., BBC, 2014, MasterCard, n.d., National Identity Management Commission, 2015, Mastercard, n.d., Azeez, 2015, 20 24 23 27 26 25 Business Day, 2015, National Identity Management Commission, n.d.; National Identity Management Commission, 2013, Okonji, 2014 31 29 30 28 National Identity Management Commission, 2013, Udunze, 2014, National Identity Management System, 2013, National 33 32 34 Identity Management Commission, 2013, National Identity Management Commission, 2015, MasterCard, n.d., National Identity Management Commission, 2015 37 36 35 Grossman & Tarazi, 2014, National Identity Management Commission, 2015, National Identity Management Commission, 38 39 2015, BBC, 2014, National Identity Management Commission, 2015. 120
143 144 145 146 147 148 149 150 151 152 153
Language:English
Score: 766255.2
-
https://www.itu.int/en/publica.../files/basic-html/page148.html
Data Source: un
Draft RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised)
Document Title:
Draft RESOLUTION GSC-16/04: (Plenary)
Identity Management (Revised)
Source:
Identity Management and Identifications Systems HIS Panel at GSC-16 Opening Plenary
Contacts:
Bilel Jamoussi (ITU)
GSC Session:
Closing Plenary
Agenda Item:
3.4
RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised)
The 16th Global Standards Collaboration meeting (Halifax, 31 October – 3 November 2011)
Recognizing:
a) the importance of Identity Management (IDM) to practically all forms of social and economic activity, as well as the technical development and deployment of all information and communication technology (ICT) services for diverse entities (persons, organizations/providers, and objects), including:
1) authentication and credentials;
2) identifiers and their resolution or use for access;
3) attributes including directories, presence and availability;
4) derivative identity information including reputation;
5) discovery and interoperability of the above authoritative resources;
6) identity assurance; and
7) identity management privacy, security and governance;
b) a common interest of network operators, service/application providers, government, and users in effective, trusted, interoperable frameworks for Identity Management, and Open Identity Trust Frameworks for online interactions;
c) that Identity Management capabilities are essential to almost all areas of GSC cooperation, including RFIDs, sensors, wireless and near-field devices, on-board GSM, IPTV, NGN, cloud computing, healthcare, emergency communications, e-government, disaster relief, product proofing against misuse of resources, lawful interception, mitigating identity theft;
d) the rapidly increasing implementation of nomadic and mobile network access by users, providers, and objects to a complex interconnected set of providers necessitate enhanced and new IdM capabilities;
e) that effective protection of all kinds of national communications, transportation, electrical and other critical infrastructures are fundamentally dependent on effective Identity Management capabilities;
f) that ITU-T has initiated study of Identity Management requirements, architectures, security frameworks and interoperability including use cases and gap analysis (including coordination with other SDOs);
g) that ISO/IEC JTC1/SCs and ISO TCs have already produced international standards and are developing others standards which address and resolve issues associated with management of identities.
h) that
ITU-T’s JCA-IdM (Joint Coordination Activity) coordinates IdM activities within ITU-T and collaborates with other major IdM standards bodies to resolve issues associated with management of identities.
i) that standards of GSC organizations can provide a coherent systematic framework for enhancing trusted open Identity Management interoperability that can minimize risks and the development of mechanisms to mitigate the risks, and Open Identity Trust Frameworks for online secure online interactions;
j) that common frameworks can provide for trusted global discovery and interoperability of identity resources; and
k) that continuing cooperation and collaboration among organizations addressing Identity Management issues can promote progress and contribute to building and maintaining a culture of trusted, interoperable IdM capabilities.
Resolves:
1) to request the ITU, with the assistance of Participating Standards Organizations (PSOs), to develop a comprehensive inventory of national, regional and international initiatives and activities in the area of Identity Management;
2) to encourage the ITU to explore the possibility of global harmonized Identity Management standards, including the development of an internationally recognized definition of IdM based on the ITU-T consensus model, taking into account important work undertaken by other international organizations including ISO/IEC JTC 1/SC 27;
l) to encourage PSOs and Observer Organizations of the GSC to evaluate and enhance existing and evolving new standards, Recommendations, and administrative practices relating to Identity Management that promote discovery and interoperability of identity resources, and Open Identity Trust Frameworks for secure online interactions;
3) to encourage PSOs and Observer Organizations of the GSC to participate in global, regional, and national Identity Management collaborative activities, and to adopt common standards and administrative practices that enhance global Identity Management interoperability.
4) to encourage PSOs and Observer Organizations of the GSC to participate in the ITU-T’s Joint Coordination Activity for Identity Management (JCA-IdM); and
5) to encourage wide use of ITU-T Recommendations (e.g. the ITU-T IdM Landscape document, baseline terminology (X.1252), baseline capabilities Recommendation (X.1250), etc.)
6) to encourage active participation of organizations with need for IdM, particularly governments and financial institutions.
7) To encourage use of existing standards of this nature in support of any new IdM work.
________________
Page 1 of 2
Language:English
Score: 764620.65
-
https://www.itu.int/en/ITU-T/g...closingplenary/GSC16-CL-11.doc
Data Source: un
The nature of digital identities is explored in this report, as well as a core definition of their usage presented, based on three phases: • Identity proofing - the process of establishing the legal identity of an entity presenting him/herself for registration. (...) The paper then describes different types of digital identities, from the foundational identity, usually created as part of a national identity scheme, and is typically based on the formal establishment of identity through the examination of qualifying (breeder) documents such as birth records, marriage certificates, and social security documents. (...) In addition to architectures, a further complication is the class of digital identity used – either static or dynamic. A static digital identity is derived from the foundational identity and is one that is typically issued by a national identity scheme, or historically, by a bank.
Language:English
Score: 764620.65
-
https://www.itu.int/en/publica...n/files/basic-html/page42.html
Data Source: un
RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised)
RESOLUTION GSC-16/04: (Plenary) Identity Management (Revised)
The 16th Global Standards Collaboration meeting (Halifax, 31 October – 3 November 2011)
Recognizing:
a) the importance of Identity Management (IdM) to practically all forms of social and economic activity, as well as the technical development and deployment of all Information and Communication Technology (ICT) services for diverse entities (persons, organizations/providers, and objects), including:
1) authentication and credentials;
2) identifiers and their resolution or use for access;
3) attributes including directories, presence and availability;
4) derivative identity information including reputation;
5) discovery and interoperability of the above authoritative resources;
6) identity assurance; and
7) identity management privacy, security and governance;
b) a common interest of network operators, service/application providers, government, and users in effective, trusted, interoperable frameworks for Identity Management, and Open Identity Trust Frameworks for online interactions;
c) that Identity Management capabilities are essential to almost all areas of GSC cooperation, including RFIDs, sensors, wireless and near-field devices, on-board GSM, IPTV, NGN, cloud computing, healthcare, emergency communications, e-government, disaster relief, product proofing against misuse of resources, lawful interception, mitigating identity theft;
d) the rapidly increasing implementation of nomadic and mobile network access by users, providers, and objects to a complex interconnected set of providers necessitate enhanced and new IdM capabilities;
e) that effective protection of all kinds of national communications, transportation, electrical and other critical infrastructures are fundamentally dependent on effective Identity Management capabilities;
f) that ITU-T has initiated study of Identity Management requirements, architectures, security frameworks and interoperability including use cases and gap analysis (including coordination with other SDOs);
g) that ISO/IEC JTC 1/SCs and ISO TCs have already produced international standards and are developing others standards which address and resolve issues associated with management of identities;
h) that ITU-T’s JCA-IdM (Joint Coordination Activity - IdM) coordinates IdM activities within ITU-T and collaborates with other major IdM standards bodies to resolve issues associated with management of identities;
i) that standards of GSC organizations can provide a coherent systematic framework for enhancing trusted open Identity Management interoperability that can minimize risks and the development of mechanisms to mitigate the risks, and Open Identity Trust Frameworks for online secure online interactions;
j) that common frameworks can provide for trusted global discovery and interoperability of identity resources; and
k) that continuing cooperation and collaboration among organizations addressing Identity Management issues can promote progress and contribute to building and maintaining a culture of trusted, interoperable IdM capabilities.
Resolves:
1) to request the ITU, with the assistance of Participating Standards Organizations (PSOs), to develop a comprehensive inventory of national, regional and international initiatives and activities in the area of Identity Management;
2) to encourage the ITU to explore the possibility of global harmonized Identity Management standards, including the development of an internationally recognized definition of IdM based on the ITU-T consensus model, taking into account important work undertaken by other international organizations including ISO/IEC JTC 1/SC 27;
3) to encourage PSOs and Observer Organizations of the GSC to evaluate and enhance existing and evolving new standards, Recommendations, and administrative practices relating to Identity Management that promote discovery and interoperability of identity resources, and Open Identity Trust Frameworks for secure online interactions;
4) to encourage PSOs and Observer Organizations of the GSC to participate in global, regional, and national Identity Management collaborative activities, and to adopt common standards and administrative practices that enhance global Identity Management interoperability;
5) to encourage PSOs and Observer Organizations of the GSC to participate in the ITU-T’s Joint Coordination Activity for Identity Management (JCA-IdM);
6) to encourage wide use of ITU-T Recommendations (e.g. the ITU-T IdM Landscape document, baseline terminology (X.1252), baseline capabilities Recommendation (X.1250), etc.);
7) to encourage active participation of organizations with need for IdM, particularly governments and financial institutions; and
8) to encourage use of existing standards of this nature in support of any new IdM work.
________________
Page 1 of 2
Language:English
Score: 763904.64
-
https://www.itu.int/en/ITU-T/g...ns/Res_GSC-16_slash_04_IdM.doc
Data Source: un
RESOLUTION GSC-13/M: (Source) Title (Status)
Document Title:
Draft RESOLUTION GSC-17/04: (Plenary)
Identity Management and Identification Systems (Reaffirmed)
Source:
Identity Management and Identification Systems HIS Panel at GSC-17 Opening Plenary
Contacts:
Mr. Bilel Jamoussi (ITU)
GSC Session:
Closing Plenary
Agenda Item:
3.4
RESOLUTION GSC-17/04: (Plenary) Identity Management (Reaffirmed)
The 17th Global Standards Collaboration meeting (Jeju, 13 – 16 May 2013)
Recognizing:
a) the importance of Identity Management (IdM) to practically all forms of social and economic activity, as well as the technical development and deployment of all Information and Communication Technology (ICT) services for diverse entities (persons, organizations/providers, and objects), including:
1) authentication and credentials;
2) identifiers and their resolution or use for access;
3) attributes including directories, presence and availability;
4) derivative identity information including reputation;
5) discovery and interoperability of the above authoritative resources;
6) identity assurance; and
7) identity management privacy, security and governance;
b) a common interest of network operators, service/application providers, government, and users in effective, trusted, interoperable frameworks for Identity Management, and Open Identity Trust Frameworks for online interactions;
c) that Identity Management capabilities are essential to almost all areas of GSC cooperation, including RFIDs, sensors, wireless and near-field devices, on-board GSM, IPTV, NGN, cloud computing, healthcare, emergency communications, e-government, disaster relief, product proofing against misuse of resources, lawful interception, mitigating identity theft;
d) the rapidly increasing implementation of nomadic and mobile network access by users, providers, and objects to a complex interconnected set of providers necessitate enhanced and new IdM capabilities;
e) that effective protection of all kinds of national communications, transportation, electrical and other critical infrastructures are fundamentally dependent on effective Identity Management capabilities;
f) that ITU-T has initiated study of Identity Management requirements, architectures, security frameworks and interoperability including use cases and gap analysis (including coordination with other SDOs);
g) that ISO/IEC JTC 1/SCs and ISO TCs have already produced international standards and are developing others standards which address and resolve issues associated with management of identities;
h) that ITU-T’s JCA-IdM (Joint Coordination Activity - IdM) coordinates IdM activities within ITU-T and collaborates with other major IdM standards bodies to resolve issues associated with management of identities;
i) that standards of GSC organizations can provide a coherent systematic framework for enhancing trusted open Identity Management interoperability that can minimize risks and the development of mechanisms to mitigate the risks, and Open Identity Trust Frameworks for online secure online interactions;
j) that common frameworks can provide for trusted global discovery and interoperability of identity resources; and
k) that continuing cooperation and collaboration among organizations addressing Identity Management issues can promote progress and contribute to building and maintaining a culture of trusted, interoperable IdM capabilities.
Resolves:
1) to request the ITU, with the assistance of Participating Standards Organizations (PSOs), to develop a comprehensive inventory of national, regional and international initiatives and activities in the area of Identity Management;
2) to encourage the ITU to explore the possibility of global harmonized Identity Management standards, including the development of an internationally recognized definition of IdM based on the ITU-T consensus model, taking into account important work undertaken by other international organizations including ISO/IEC JTC 1/SC 27;
3) to encourage PSOs and Observer Organizations of the GSC to evaluate and enhance existing and evolving new standards, Recommendations, and administrative practices relating to Identity Management that promote discovery and interoperability of identity resources, and Open Identity Trust Frameworks for secure online interactions;
4) to encourage PSOs and Observer Organizations of the GSC to participate in global, regional, and national Identity Management collaborative activities, and to adopt common standards and administrative practices that enhance global Identity Management interoperability;
5) to encourage PSOs and Observer Organizations of the GSC to participate in the ITU-T’s Joint Coordination Activity for Identity Management (JCA-IdM);
6) to encourage wide use of ITU-T Recommendations (e.g. the ITU-T IdM Landscape document, baseline terminology (X.1252), baseline capabilities Recommendation (X.1250), etc.);
7) to encourage active participation of organizations with need for IdM, particularly governments and financial institutions; and
to encourage use of existing standards of this nature in support of any new IdM work
Page 1 of 3
Language:English
Score: 763879.4
-
https://www.itu.int/en/ITU-T/g...%20(Identity%20Management).doc
Data Source: un
Microsoft PowerPoint - 3 WS Speakers_presentation_Identity Jiwei Wei, Huawei.ppt
ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006
International Telecommunication Union ITU-T
Digital Identity Management Digital Identity Management TTowards owards UUltimate ltimate NNetwork etwork SSecurityecurity
Jiwei Wei Security Architect, Huawei Technologies
Co., Ltd.
(...) Entity Identity needs to be effectively managed.
ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 6
ITU-T
Requirement for NGN Identity Management
o Internet access • E.g. (...) Federation ID
ITU-T Workshop on “Digital Identity for NGN“ Geneva, 5 December 2006 18
ITU-T
Thanks for Your Attention!
Language:English
Score: 763626.27
-
https://www.itu.int/dms_pub/it.../06/04/T06040020030001PDFE.pdf
Data Source: un