presentation to isttf september 23, 2008. trustworthy computing category of concept: age...

5
Presentation to ISTTF September Presentation to ISTTF September 23, 2008 23, 2008

Post on 19-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Presentation to ISTTF September 23, Presentation to ISTTF September 23, 20082008

Trustworthy Computing

Category of concept:Category of concept:

Age Verification / Digital Identity Age Verification / Digital Identity

Launch Status:Launch Status:

Nether launched nor part of an existing productNether launched nor part of an existing product

Concept:Concept:

Reusing Reusing offlineoffline trust in trust in onlineonline contexts contexts

Catalyze changes for creation of improved online Catalyze changes for creation of improved online trust, including optional Digital Playgrounds that trust, including optional Digital Playgrounds that enjoy similar levels of safety to their offline enjoy similar levels of safety to their offline counterpartscounterparts

Use interoperable Information Cards as ‘keys’ to Use interoperable Information Cards as ‘keys’ to enabling such safer Digital Playgroundsenabling such safer Digital Playgrounds

Basis for discussion; not a completed “solution”Basis for discussion; not a completed “solution”ISTTF Presentation 9/23/2008

Trustworthy Computing

Enabling such optional digital playgrounds first requires addressing two key Enabling such optional digital playgrounds first requires addressing two key items:items:

1.1. How to catalyze market-driven adoption of in-person proofing & How to catalyze market-driven adoption of in-person proofing & Information CardsInformation Cards

2.2. Addressing non-technical policy issues including:Addressing non-technical policy issues including:

PrivacyPrivacy: Architecting the system such that it does not create new : Architecting the system such that it does not create new privacy risksprivacy risks

SecuritySecurity: How best to keep digital identities secure once they have : How best to keep digital identities secure once they have been distributed; Determining whether a system like this strikes the been distributed; Determining whether a system like this strikes the right balance between risk and usefulnessright balance between risk and usefulness

EducationEducation: Teaching children and parents about the importance of : Teaching children and parents about the importance of keeping their digital identity safekeeping their digital identity safe

Identity Issuance PolicieIdentity Issuance Policies: Agreement on the criteria for in-person s: Agreement on the criteria for in-person proofing events and the subsequent management of digital identity proofing events and the subsequent management of digital identity cardscards

Resourcing / IndemnityResourcing / Indemnity: Providing institutions with the resources and : Providing institutions with the resources and indemnity needed for securely issuing and managing digital identity indemnity needed for securely issuing and managing digital identity cardscards

Critical MassCritical Mass: What incentives would be needed for children to use : What incentives would be needed for children to use such experiences?such experiences?

ModerationModeration: What kind of moderating is appropriate? Who should : What kind of moderating is appropriate? Who should moderate?moderate?

Trustworthy Computing

Questions?Questions?

Contact InformationContact InformationJules Cohen – Jules Cohen – [email protected] Cosson– Chuck Cosson– [email protected]

ISTTF Presentation 9/23/2008

Trustworthy Computing

© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after

the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.