83
May 17th 2010 INTRODUCTION by Kaliya Hamlin @identitywoman Tuesday, May 18, 2010

Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Embed Size (px)

DESCRIPTION

This is the opening keynote from the 10th Internet Identity Workshop. Given May 17th, 2010

Citation preview

Page 1: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

May 17th 2010

INTRODUCTION

by Kaliya Hamlin @identitywoman

Tuesday, May 18, 2010

Page 2: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

We have been meeting together every 6 months since the fall of 2005. The Internet Identity Workshop is the work group of Identity Commons an industry consortia & community linking many efforts focused on a people centric identity layer of the net. The Workshop provides open forum for both the big guys and the small fry to come together in a safe and balanced space. It is not about any one technology - rather it is a place to discuss multiple interoperating (and possible competing) projects, standards, and networks for identity, data sharing, and reputation.

IIW is Co-Produced by Phil Windley (@windley),Kaliya Hamlin (@identitywoman) & Doc Searls (dsearls) IIWX is being co-facilitated by Kaliya Hamlin and Heidi Nobantu Saul (@nobantu). The Notes Collection Center is being run by Kas Neteler (@kasneteler) and Heidi Nobantu Saul.

Tuesday, May 18, 2010

Page 3: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

SHARED VISION for people’s identity on the scale of the web.

Tuesday, May 18, 2010

Page 4: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Freedom and

Autonomy for People

Tuesday, May 18, 2010

Page 5: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Open Standardsare Essential

Tuesday, May 18, 2010

Page 6: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

No One Dominant Player

Tuesday, May 18, 2010

Page 7: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

There will be a Big Bang

With all new technologies there is a point at which new things start happening that the creators of the technology did not envision this is a

big bang in identity.

Tuesday, May 18, 2010

Page 8: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Mission statements:• Identity Commons: Support, facilitate, and promote the creation of an open identity layer

for the Internet, one that maximizes control, convenience, and privacy for the individual while encouraging the development of healthy, interoperable communities.

• Information Card Foundation: Promote, protect, and enable the development of an open, trusted, interoperable, royalty-free identity layer for the Internet that maximizes control over personal information by individuals

• OpenID Foundation: To foster and promote the development of, public access to, and adoption of OpenID as a framework for user-centric identity on the Internet; and To acquire, create, hold, and manage intellectual property related to OpenID and provide equal access to such intellectual property to the OpenID community and public at no charge.

• Kantara Intiative: Foster identity community harmonization, interoperability, innovation, and broad adoption through the development of open identity specifications, operational frameworks, education programs, deployment and usage best practices for privacy-respecting, secure access to online services

• Open Identity Exchange: Collecting aggregating, and distributing information regarding the identity-related services industry to businesses and other stakeholders in that industry in order to improve conditions in that industry by fostering innovation, market transparency, and identity-related product and service interoperability; Providing a neutral, open market registration system for participants in the identity-related services industry;

• Data Portability Project: Data portability enables a borderless experience, where people can move easily between network services, reusing data they provide while controlling their privacy and respecting the privacy of others. Our Mission is to help people to use and protect the data they create on networked services, and to advocate for compliance with the values of DataPortability.

Tuesday, May 18, 2010

Page 9: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

What is the state of the world now?

Tuesday, May 18, 2010

Page 10: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Facebook Privacy Issues Have Made News

Tuesday, May 18, 2010

Page 11: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Flowering of Distributed Social Network Projects

Appleseed(Mozilla Drumbeat)

GNU Social

versionvega

& more....Tuesday, May 18, 2010

Page 12: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Generating More Data then Ever

The Big Data Workshop was here April 23, 2010http://www.bigdataworkshop.com

Tuesday, May 18, 2010

Page 13: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

LessControl

then Ever

Tuesday, May 18, 2010

Page 14: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Lots of Open Standards

InformationCards

XRI/XDI

SAML

Tuesday, May 18, 2010

Page 15: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Broad Base of Participation BIG COMPANY SPONSORSMSFTPingIDSUNFacebookGoogleYahooCiscoPlaxoCommerce NetAdobeBTNovellFacebookAOLPing IdentityPaypal / eBay

NONPROFIT SPONSORSISOCKantara/Liberty AllianceInfo Card FoundationOASIS IDTrustMozillaHiggins ProjectBandit ProjectPlanetworkInternet Society

CORPORATE PARTICIPANTSPaypal Booz Allen Hamilton AppleBurton GroupHewlett PackaredInternational Business MachinesIntuitLexisNexisNippon Telegraph and Telephone CorporationNokia Siemens NetworksNRIOracleOrangeRackspaceRadiant LogicSony EricssonThe MITRE CorporationTucows IncVeriSign, Inc.Vodafone Group R &DAlcatel-LucentAcxiom Identity SolutionsAcxiom ResearchEquifaxLinkedInAmazon

SMALL COMPANYSPONSORSFuGen SolutionsOUNORel-IDPokenVidoopChimpAuthentrusSxipClaimID

IETFW3COASIS

SMALL COMPANY PATICIPANTSÅngströDigg, Inc.PrivoExpensifyFamilySearch.orgFreshBooksGigyaGluuJanrainKynetxNetMesh Inc.ProtivitiSocialtextTriCipher, Inc.Trusted-IDWave SystemsSix Apart

NONPROFIT PARTICIPANTSCenter for Democracy and TechnologyDataPortability ProjectIdM Network NetherlandsOCLCOpen Forum FoundationWorld Economic Forum

UNIVERSITY PARTICIPANTSGoldsmiths, University of LondonNewcastle UniversityStanford University

GOVERNMENT PARTICIPANTSOffice of the Chief Informaiton Office, Province of British Columbia

and more...

Tuesday, May 18, 2010

Page 16: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Where did we come from?

Tuesday, May 18, 2010

Page 17: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

a Shared History

Tuesday, May 18, 2010

Page 18: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

THE Directory Wars of the 90s

SHARED EXPERIENCE in past wars

Tuesday, May 18, 2010

Page 19: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

SHARED EXPERIENCE in past wars

vs

Passport & Hailstorm

Tuesday, May 18, 2010

Page 20: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

a Shared Context

Tuesday, May 18, 2010

Page 21: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

IDENTITY GANG! formed in 2004

CONTEXT For Shared Vision

Tuesday, May 18, 2010

Page 22: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

CONTEXT For Shared Vision

Early on the Identity Gang list was a critical forum for community collaboration it is still active here & many of the protocol efforts & foundations that have emerged have their own lists.

http://lists.idcommons.net/lists/info/community

Tuesday, May 18, 2010

Page 23: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

CONTEXT For Shared Vision

The Identity Gang was probably one of the first technical communities to have a very active community blog life that complemented our mailing list conversations. Doc Searls played a critical role in getting almost all community members to blog in the early days of the community 2004-2005.

There are several aggregated blogs you can go to get a sense of activity in the community.The Classic - www.planetidentity.org/A newer one under development - http://seriouslyidentity.com/

Tuesday, May 18, 2010

Page 24: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

s

CONTEXT For Shared Vision

Wiki forums were critical for sharing ideas and common language like the Lexicon

Tuesday, May 18, 2010

Page 25: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Real Time Web Tools

CONTEXT For Shared Vision

SEARCH

These are newer mediums for collaboration and information sharing using #hashtags etc. to connect work.

Tuesday, May 18, 2010

Page 26: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

a Shared Language

Tuesday, May 18, 2010

Page 27: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

SHARED LANGUAGE developed in Shared Context

Identity Gang LEXICON (driven by Paul Trevithick)in August 2005

1.Agent2.Claim3.Claimant4.Digital Identity5.Digital Identity Provider 6.Digital Subject

6. Entity7. Identity Attribute8. Identity Context9. Party10. Persona11. Relying Party

http://wiki.idcommons.net/LexiconTuesday, May 18, 2010

Page 28: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Scott David’s chair of the ID-Legal group at Identity Commons and council to several of the organizations in this space is working with the American Bar Association to develop a meta lexicon across 15+ lexicons in related fields.

SHARED LANGUAGE developed in Shared Context

Tuesday, May 18, 2010

Page 29: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Information Sharing Working Group Lexicon

SHARED LANGUAGE developed in Shared Context

Tuesday, May 18, 2010

Page 30: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

a Shared Understanding

Tuesday, May 18, 2010

Page 31: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

SHARED UNDERSTANDINGusing shared language

Laws of Identity

Kim Cameron in May 2005

http://www.identityblog.com/stories/2004/12/09/thelaws.htmlTuesday, May 18, 2010

Page 32: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Laws of Identity 1.User Control and Consent

2.Minimal Disclosure for a Constrained Use

3.Justifiable Parties

4.Directed Identity

5.Pluralism of Operators and Technologies

6.Human Integration

7.Consistent Experience Across Contexts

Kim Cameron in May 2005

SHARED UNDERSTANDINGusing shared language

Tuesday, May 18, 2010

Page 33: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

A Bill of Rights for Users of the Social Web September 4, 2007Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington

Preamble:There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can!

A Bill of Rights for Users of the Social WebWe publicly assert that all users of the social web are entitled to certain fundamental rights, specifically:

• Ownership of their own personal information, including:◦ their own profile data◦ the list of people they are connected to◦ the activity stream of content they create;

• Control of whether and how such personal information is shared with others; and• Freedom to grant persistent access to their personal information to trusted external sites.

Sites supporting these rights shall:• Allow their users to syndicate their own profile data, their friends list, and the data that’s shared

with them via the service, using a persistent URL or API token and open data formats;• Allow their users to syndicate their own stream of activity outside the site;• Allow their users to link from their profile pages to external identifiers in a public way; and• Allow their users to discover who else they know is also on their site, using the same external

identifiers made available for lookup within the service.

SHARED UNDERSTANDINGusing shared language

Tuesday, May 18, 2010

Page 34: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Properties of Identity OECD Paper At a Crossroads: "Personhood" and the Digital Identity in the Information Society

SHARED UNDERSTANDINGusing shared language

http://bit.ly/OECDdigitalpersonnoodTuesday, May 18, 2010

Page 35: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Properties of Identity 1.Identity is social.2.Identity is subjective.3.Identity is valuable.4.Identity is referential. 5.Identity is composite.

6.Identity is consequential. 7.Identity is dynamic.8.Identity is contextual. 9.Identity is equivocal.

OECD Paper At a Crossroads: "Personhood" and the Digital Identity in the Information Society

The Properties of Identity were articulated by Bob Blakley, Jeff Broberg, Anthony Nadalin, Dale Olds, Mary Ruddy, Mary Rundle, and Paul Trevithick.

SHARED UNDERSTANDINGusing shared language

Tuesday, May 18, 2010

Page 36: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Identifiers ClaimsSingle String Pairs

SHARED UNDERSTANDING

Identifiers link things together and enable correlation.

They can be endpoints on the internet.

A claim is by one party about another or itself.

It does not have to be linked to an identifier.

Proving you are over 18 for example and not giving your real name.

Tuesday, May 18, 2010

Page 37: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

SHARED UNDERSTANDING

Tuesday, May 18, 2010

Page 38: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Project VRM - 4th Parties

SHARED UNDERSTANDING

http://bit.ly/VRM4thPartyTuesday, May 18, 2010

Page 39: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

SHARED UNDERSTANDING

TECHNOLOGY

LEGAL

SOCIAL BUSINESS?

Tuesday, May 18, 2010

Page 40: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

the Evolution of the VENN

Tuesday, May 18, 2010

Page 41: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

OpenID v1+

Lightweight Identity LID+

XRI / i-names+

sxip

}v2

Evolution of OpenID

Tuesday, May 18, 2010

Page 42: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Evolution of SAML

This diagram is from a presentation by Eve Maler given at IIW

Tuesday, May 18, 2010

Page 43: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Information Cards

Tuesday, May 18, 2010

Page 44: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

SHARED INDUSTRY LANDSCAPE

Tuesday, May 18, 2010

Page 45: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

What is Venn Today?This picture is still emerging.

more will be clear by the end of this IIW.

Tuesday, May 18, 2010

Page 46: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

the Evolution of Discovery

Tuesday, May 18, 2010

Page 47: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

XRDS --> XRD-Simple --> XRD (within XRI spec)

Evolution of Discovery

Tuesday, May 18, 2010

Page 48: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Application of

XRI/XDI

Tuesday, May 18, 2010

Page 49: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

The user belongs to two different sites.

OAuth

Tuesday, May 18, 2010

Page 50: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

How can the user move photos from photo site to the social network site without giving away the password

for the photo site to the social network site?

Tuesday, May 18, 2010

Page 51: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

The user asked if they want to share - then redirected to the site to give their permission

Tuesday, May 18, 2010

Page 52: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

The photo site gives the social network site a token to the social network that gives it access to their account.

Tuesday, May 18, 2010

Page 53: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

A data tunnel is created between the user’s accounts on both sites

Tuesday, May 18, 2010

Page 54: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

A user posts photos and they can flow from one to the other - and they didn’t give away their password.

Tuesday, May 18, 2010

Page 55: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Hammer Stack Today

Tuesday, May 18, 2010

Page 56: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Protocol Family Tree

OpenID

Foundation

XNS

XDI XRI

XNS.org

XDI.ORG

OpenID

v1

LID

i-names

XRI

sxip

OpenIDv2

YADIS

XRD

XRD Simple

OpenID

v Next

Web Finger

XRDS

Current Organizations

Organizations (no longer)

Event

Independent Open Protocol

Independent Open Protocol

(no longer)

Protocol standardized at OASIS

Protocol standardized at OASIS

earlier version (no longer)

Internet

Identity

Workshop

#1 Oct 2005

Tuesday, May 18, 2010

Page 57: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Collaboration

Tuesday, May 18, 2010

Page 58: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

OSIS Interop

Tuesday, May 18, 2010

Page 59: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

3rd InteropSpring 2007

RSA Conference

European Identity Conference

Tuesday, May 18, 2010

Page 60: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Hailstorm SAMLv1 & 2

BTOracleSUN

XRIXDI

Passport

Microsoft

FireFly

Liberty Alliance

Kantara Intiative

Planetwork Link Tank

Identity Commons (1)

Identity Gang

Identity Commons (2)

OpenIDv2

OpenID Foundation

Open Identity Exchange

Information Card

Foundation

IMIIdentity Metasystem

Interoperability

Information Card

Standard

VENN OF IDENTITY

HigginsProject

Lots of Companies

Project to be annouced at

IIW

IBM

Project to be annouced at

IIW

Pamela Project

TIM

EInternet Identity Workshop

Loose Affiliations of People

Current Organizations

Organizations (no longer)

Company

Proprietary Service (no longer)

Protocol standardized at OASIS

Protocol standardized at OASIS

earlier version (no longer)

Independent Open Protocol

Independent Open Protocol

(no longer)

Paper:Shared Understanding

Event

Project with Code

Evolution of Identity Community

Tuesday, May 18, 2010

Page 61: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Project ConcordiaOngoing deployers or providers of input:

AOL Identity Management Use Case Boeing Identity Management Use Case Cisco Policy & Entitlements Managment Use CaseGeneral Motors Identity Management Use Case Government of B.C. Identity Management Use Case InCommon Federation Identity Management Use Case Micron Policy & Entitlements Management Use Case New Zealand State Services Commission Identity Management Use CaseU.S. Army Policy & Entitlements Management Use CaseU.S. General Services Administration Identity Management Use Case

Tuesday, May 18, 2010

Page 62: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Information Sharing&

User Managed Access

at Kantara

Tuesday, May 18, 2010

Page 63: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Tuesday, May 18, 2010

Page 64: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

One of the main community organizations linking various

efforts is Identity Commons.

Identity Commons

Open ID

FoundationInformation

Card

Foundation

XDI.ORG

Data

Portability

Project

Internet Identity

Workshop

Project

VRM

Higgins

Project

Pamela

Project

OSIS

Open Source

Identity System

ID-Legal

Identity

Schemas Identity

Gang

Kids

Online

Photo

Group

IDMedia

Review

OIX

Nick's

Legacy

PDX

Group that who's home is at Identity

Commons

Independant

Nonprofit

Organization

Project at

another organization

EVENT

Key

Tuesday, May 18, 2010

Page 65: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Relationships Between Peers

Tuesday, May 18, 2010

Page 66: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Peers and Relationships

Tuesday, May 18, 2010

Page 67: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

2003

2004

2006

IIW 1

IIW 2

IIW 3

2005IOS 1

IOS 2

2007

DIDW

DIDW

DIDW

DIDW

DIDW

IOS 3IIW 4

IIW5

IOS 4RSA

Burton Group

RSA Burton Group

Data Sharing Workshop

OSIS Interop 1

OSIS Interop 2

Face 2 Face Meetings

Tuesday, May 18, 2010

Page 68: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

2009

2010

DIDW

DIDW

DIDW

RSABurton Group

RSA

Burton Group

RSABurton Group

IIW 6

IIW 7

IIW 8

IIW 9

IIW 10

IIW 11

2008

Data Sharing Workshop

Data Sharing Summit

OSIS Interop 3

OSIS Interop 4

OSIS Interop5

Face 2 Face Meetings

Tuesday, May 18, 2010

Page 69: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Unconference Format

Tuesday, May 18, 2010

Page 70: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

What is happening now?

Google

PayPal

Equifax

Yahoo!

AuditorsPolicy Repository

for

Trust Frameworks

ICAM John Steensen

OCLC

XAuth

PBS Kids

Levels of Assurance

Identity Providers

Levels of

Protection

Relying Parties

OtherAuditor

Open Identity Exchange

OtherAuditor

Relying Party

Relying Party

Tuesday, May 18, 2010

Page 71: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Open Identity For Open Government

http://bit.ly/ID-Gov-Open

http://bit.ly/FastCo-IDGovFast Company blog post by KaliyaGovernment Experimenting with

Identity Technologies

Government Services Administration website on ID

Tuesday, May 18, 2010

Page 72: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Multi-Protocol Selector/Active Client

Tuesday, May 18, 2010

Page 73: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Personal Data Stores/ User Data Banks

APPLICATIONS

EXCHANGE

REFINEMENT

STORAGE

ID + ENCRYPTION

DATA + META DATA

SOURCES

$

Invention Arts Stack for User Data BanksTuesday, May 18, 2010

Page 74: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Context Enginesfor

Purpose Driven Apps

Kynetx.com

Tuesday, May 18, 2010

Page 75: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

VRM Applications

Tuesday, May 18, 2010

Page 76: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Challenges and Opportunities

Tuesday, May 18, 2010

Page 77: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

How do all these technical protocols solve real problems?

Tuesday, May 18, 2010

Page 78: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

How to communicate clearly about our ideas and

share this work?

Tuesday, May 18, 2010

Page 79: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Organizations

How do we apply identity technologies

in different realms?

Government

Businesses

Social Sites

Ultimately it must work for “regular” people

Tuesday, May 18, 2010

Page 80: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

USABILITYDifferent Contexts

Tuesday, May 18, 2010

Page 81: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

How does identity work between them?

TECHNOLOGY

LEGAL

SOCIAL BUSINESS?

Tuesday, May 18, 2010

Page 82: Internet Identity Workshop 10 - Introduction to the User-Centric Identity Community

Conclusion: a funny take the identity dog logo

On the dog, no one knows when you’re on the Internet.

Tuesday, May 18, 2010