presentation to isttf september 23, 2008. trustworthy computing category of concept: age...
Post on 19-Dec-2015
213 views
TRANSCRIPT
Trustworthy Computing
Category of concept:Category of concept:
Age Verification / Digital Identity Age Verification / Digital Identity
Launch Status:Launch Status:
Nether launched nor part of an existing productNether launched nor part of an existing product
Concept:Concept:
Reusing Reusing offlineoffline trust in trust in onlineonline contexts contexts
Catalyze changes for creation of improved online Catalyze changes for creation of improved online trust, including optional Digital Playgrounds that trust, including optional Digital Playgrounds that enjoy similar levels of safety to their offline enjoy similar levels of safety to their offline counterpartscounterparts
Use interoperable Information Cards as ‘keys’ to Use interoperable Information Cards as ‘keys’ to enabling such safer Digital Playgroundsenabling such safer Digital Playgrounds
Basis for discussion; not a completed “solution”Basis for discussion; not a completed “solution”ISTTF Presentation 9/23/2008
Trustworthy Computing
Enabling such optional digital playgrounds first requires addressing two key Enabling such optional digital playgrounds first requires addressing two key items:items:
1.1. How to catalyze market-driven adoption of in-person proofing & How to catalyze market-driven adoption of in-person proofing & Information CardsInformation Cards
2.2. Addressing non-technical policy issues including:Addressing non-technical policy issues including:
PrivacyPrivacy: Architecting the system such that it does not create new : Architecting the system such that it does not create new privacy risksprivacy risks
SecuritySecurity: How best to keep digital identities secure once they have : How best to keep digital identities secure once they have been distributed; Determining whether a system like this strikes the been distributed; Determining whether a system like this strikes the right balance between risk and usefulnessright balance between risk and usefulness
EducationEducation: Teaching children and parents about the importance of : Teaching children and parents about the importance of keeping their digital identity safekeeping their digital identity safe
Identity Issuance PolicieIdentity Issuance Policies: Agreement on the criteria for in-person s: Agreement on the criteria for in-person proofing events and the subsequent management of digital identity proofing events and the subsequent management of digital identity cardscards
Resourcing / IndemnityResourcing / Indemnity: Providing institutions with the resources and : Providing institutions with the resources and indemnity needed for securely issuing and managing digital identity indemnity needed for securely issuing and managing digital identity cardscards
Critical MassCritical Mass: What incentives would be needed for children to use : What incentives would be needed for children to use such experiences?such experiences?
ModerationModeration: What kind of moderating is appropriate? Who should : What kind of moderating is appropriate? Who should moderate?moderate?
Trustworthy Computing
Questions?Questions?
Contact InformationContact InformationJules Cohen – Jules Cohen – [email protected] Cosson– Chuck Cosson– [email protected]
ISTTF Presentation 9/23/2008
Trustworthy Computing
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after
the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.