Infosecurity Denmark

Jan Camenisch: How to Protect On-Line Identity

Principle Research Staff Member, IBM Research

Authentication without Identifcation: How to Protect On-Line Identity

Today, authentication on electronic media is typically done by identication followed by authorization. Users are forced to constantly identify themselves, leaving a trail of personal information. Methods for user authentication are typically weak. Both put our security and privacy at risk. In this talk we present authentication mechanisms that let service provider authorize users by requesting only the necessary amount of the user. We show how easy it is to use these advanced privacy-protecting authentication mechanisms and how they make it easier for service providers to protect user data. Finally, we will discuss a number of use cases.

Rate this video

1 star 2 star 3 star 4 star 5 star
Add a comment...
Post as (log out)