Digital Identity

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(References)
(Digital Identity)
Line 6: Line 6:
=== 1.0 Philosophy ===
=== 1.0 Philosophy ===
-
The philosophy of Identity 1.0 is "site-centric". This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.
+
The philosophy of Identity 1.0 is "site-centric".[1] This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 "Identity Silos"]]
[[Image:site centric.jpg|thumb|300px|center|Figure 1: Identity 1.0 "Identity Silos"]]
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]
[[Image:Site_centric2.jpg|thumb|300px|center|Figure 2: Identity 1.0 site-centric philosophy]]
Line 19: Line 19:
===2.0 Philosphy===
===2.0 Philosphy===
-
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site; thus allowing for a more efficient and enjoyable experience.
+
Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site[2]; thus allowing for a more efficient and enjoyable experience.
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]
[[Image:user_centric.jpg|thumb|300px|center|Figure 3: Identity 2.0 user-centric]]
Line 36: Line 36:
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a single trusted source. Other sites are only permitted to verify the required about details about identity. Such as "Is the person over 21?", "Is the person a U.S. resident". This puts the control of their identies into the hands of the user.
Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a single trusted source. Other sites are only permitted to verify the required about details about identity. Such as "Is the person over 21?", "Is the person a U.S. resident". This puts the control of their identies into the hands of the user.
-
==Future==
+
==See Also==
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.
There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.
Line 55: Line 55:
==References==
==References==
-
[http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org
+
[1] [http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video
 +
 
 +
[2] [http://en.wikipedia.org/wiki/Identity_2.0/ Identity 2.0] Wikipedia.org
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org
[http://en.wikipedia.org/wiki/Digital_identity  Digital Identity] Wikipedia.org
Line 61: Line 63:
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement
[http://identity20.com/ Identity 2.0] Identity 2.0 Movement
-
[http://www.sxip.com/videos Identity 2.0 Keynote] Sxip Identity Video
+
 
 +
--[[User:Brennej|Jeff]] 19:46, 7 April 2008 (EDT)

Revision as of 23:46, 7 April 2008

Digital Identity

Digtial identity refers to the online identity of Internet users. These digital identities are used to verify and validate users when access websites and web services. The concept of digital identity is in the midst of a turning point. The current model, referred to as Identity 1.0, has various identifiable flaws. Identity 1.0 is expected to be replaced by Identity 2.0, which is seen as a revolution in digital identity verification on the Internet.

Contents


Identity 1.0

1.0 Philosophy

The philosophy of Identity 1.0 is "site-centric".[1] This refers to the fact the people's digital identities are locked-in with specific sites. Sites are seen as the center of digital identities, they store people's identities for their own purposes. Therefore, people's identities are not shared across various sites, which means people are required to repeatedly enter the same information on each site's particular user registration forms.

Figure 1: Identity 1.0 "Identity Silos"
Figure 2: Identity 1.0 site-centric philosophy

1.0 Structure

In addition to a less enjoyable user-experience, Identity 1.0 is also flawed in it's ability to scale efficiently. This is due to the fact that each time a user visits a resource (site), the resource must check a directory to identify the user and verify they have permission.

Figure 3: Identity 1.0 Structure

Identity 2.0

2.0 Philosphy

Identity 2.0 represents a major shift from the philosophy of Identity 1.0. Identity 2.0 moves away from the site-centric model, and puts the user at the center. This is a more open and simple philosophy. This allows the user to take their identity from any site to any site[2]; thus allowing for a more efficient and enjoyable experience.

Figure 3: Identity 2.0 user-centric

2.0 Structure

Identity 2.0 follows a transparent structure which closely mimics our real-world identification processes. A major advantage here is the flexibility and scalability.

Figure 3: Identity 2.0 user-centric

The following are two examples of the scaling possible with Identity 2.0.

Figure 3: Identity 2.0 user-centric
Figure 3: Identity 2.0 user-centric

Identity 2.0 Security

Identity 2.0 is much more secure than its predecessor 1.0. Instead of having their identities controlled by numerous sites, users' identities are stored by a single trusted source. Other sites are only permitted to verify the required about details about identity. Such as "Is the person over 21?", "Is the person a U.S. resident". This puts the control of their identies into the hands of the user.

See Also

There are several companies and technologies looking to implement and direct the future of digital identity under the Identity 2.0 movement.

Open ID

Sxip Identity

Oasis

Information Cards

Light-Weight_Identity/LID

Windows Live ID

Yadis


References

[1] Identity 2.0 Keynote Sxip Identity Video

[2] Identity 2.0 Wikipedia.org

Digital Identity Wikipedia.org

Identity 2.0 Identity 2.0 Movement


--Jeff 19:46, 7 April 2008 (EDT)

Personal tools