A user-centric PKI based-protocol to manage FC2 digital identities
نویسندگان
چکیده
The proliferation of e-services (e.g. e-commerce, e-health, e-government) within the emerging digital Identity Management Systems make Internet an undeniable convenient and powerful tool for users. However in this environment, users are required to manage several digital identities and a great number of personal data. As such, simplification of users’ involvement is highly needed while increasing the users’ confidence, and guaranteeing security. This paper proposes a low-cost authentication solution which leads to a reduction of users’ identities, even across several circles of trust, while maintaining high-level security. This solution is suitable for FC2, a platform dedicated to manage digital identities within circles of trust.
منابع مشابه
Usability and Privacy in Identity Management Architectures
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to an increasing number of different identities that each user needs to manage. As a result, many people feel overloaded with identities and suffer from password fatigue. This is a serious problem and makes people unable properly control and protec...
متن کاملExploring a New World of Identity with Identity 2.0 based Solutions
On the Internet today, account registration is nearly always a requirement to interact with any website in a meaningful way. Each digital identity a user creates is a new and completely disjoint identity from all other existing digital identities of the user. These traditional identities, Identity 1.0 identities, are site-centric and centralized. Alternatively, Identity 2.0 identity solutions a...
متن کاملMobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System
Traditional identification-centric RFID system (IRS) is designed to provide services of object identification/tracing/locating, but it has some shortcomings when encountering a dynamic environment in which the status of the systems and the service requirements of users/objects may change continuously. Very recently a new Code-centric RFID system (CRS), which is far different from the traditiona...
متن کاملPortable User-Centric Identity Management
User-centric identity management has recently received significant attention for handling private and critical identity attributes. The notable idea of usercentric identity management allows users to control their own digital identities. Current user-centric identity management approaches are mainly focused on interoperable architectures between existing identity management systems. Normally, u...
متن کاملA User-Centric System for Verified Identities on the Bitcoin Blockchain
We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin’s decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even...
متن کامل