SlideShare a Scribd company logo
1 of 6
Download to read offline
Technology and Investment, 2013, 4, 7-12
doi:10.4236/ti.2013.41002 Published Online February 2013 (http://www.scirp.org/journal/ti)



                     Identity and Mobility in a Digital World
                                                     Ali M. Al-Khouri
                                          Emirates Identity Authority, Abu Dhabi, UAE
                                               Email: ali.alkhouri@emiratesid.ae

                      Received October 22, 2012; revised November 20, 2012; accepted November 27, 2012


ABSTRACT
Mobile identity management has attracted the attention of both the public and private sectors in the last few years. In the
context of service delivery, modern mobile communication networks offer more convenient approaches to developing
citizen-centric applications. However, taking into consideration the need for compelling user authentication and identi-
fication, secure communication in mobile environments remains a challenging matter. This article explores the potential
role of government-issued smart identity cards in leveraging and enabling a more trusted mobile communication base. It
delves into the identity management infrastructure program in the United Arab Emirates (UAE) and how the smart
identity card and overall system architecture have been designed to enable trusted and secure transactions for both
physical and virtual mobile communications.

Keywords: Identity Management; Mobile Identity; National Authentication Infrastructure; Wireless PKI; Identity
          Provider; UAE

1. Introduction                                                    are some “characteristics unique to the mobile paradigm,
                                                                   the increased complexity of emerging handheld devices,
Now more than ever, the world is transitioning drasti-
                                                                   the greater sensitivity to security and load related prob-
cally to digital spheres, in which the best possible use is
                                                                   lems in wireless infrastructure and increased complexi-
made of digital technologies. Our transition to the digital
                                                                   ties of scale” [3]. This implies that we first need to have
world has been rapid and innovative, and it is now shift-
                                                                   unified identification criteria that allow us to identify
ing us towards a more converged existence. It was not
                                                                   mobile and virtual individuals [2]. The role of an “iden-
too long ago that discrete devices worked in isolation,            tity provider” is crucial to confirm the credibility of the
but now they are ubiquitous and provide us with a seam-            parties participating in a service or transaction [2]. It
less experience in service delivery that can be accessed           should provide sufficient credentials for service provid-
virtually from anywhere and at anytime. For example,               ers’ relying parties to explicitly authenticate mobile users,
one could submit a service request on the Web, follow              thus enabling trust in the transactions being made se-
and track the delivery progress using a landline on IVR,           curely.
call a contact center and update the request, provide ad-             In this article, we examine the role that a national
ditional information at a kiosk, pay using a credit card           identity infrastructure could play in the facilitation of
from a mobile phone, and receive the physical goods at             mobile environments, with specific reference to the
the designated location and a confirmation of delivery             United Arab Emirates (UAE). In light of the current
via SMS. This is the reality of a converged digital world.         shortcomings in the existing literature about government
   In this digital domain, all facets of mobile identity           practices in the field, we attempt to create government-
management are gaining wider attention from both the               published content to support the current body of know-
public and private sectors. Their significance lies in their       ledge that could support the development of both the
contribution towards providing trust for transactions in           practice and research fields.
user-centric applications and their impact on the overall             This article is structured as follows: Section 2 provides
context of service delivery [1]. However, this is not as           a short overview of the role of identity, in light of con-
tranquil as it may sound. The primary challenge is that            verging digital technologies; Section 3 introduces the
mobile identity management systems need to be multi-               UAE’s digital identity management infrastructure; Sec-
laterally secure and allow appropriate user access to data,        tion 4 briefly describes the UAE’s identity system and its
while enabling privacy and anonymity [2].                          service eco-system; Section 5 provides an overview of
   Referring to the specificity of the mobile services field       the digital ID profile and how it helps in establishing
in modern networks, Srirama et al. (2006) state that there         trust in the e-transactions; Section 6 presents how the

Copyright © 2013 SciRes.                                                                                                    TI
8                                                     A. M. Al-KHOURI


UAE identity management system supports mobility,                  In reality, there are multiple providers of identity for
both from individual and enterprise perspectives; Section       any given entity, all jostling for space, which enable
7 looks at some government plans that attempt to inte-          cross verification and authentication over diverse ser-
grate mobile phones with its national identity manage-          vices. Thus, as long as the services are virtual, inter-de-
ment infrastructure to improve the accessibility of its         pendent identity verification can suffice. Yet, with real
services; and finally, Section 8 concludes with some            services like physical goods, secure communication en-
perspectives.                                                   ablement, and financial transactions, higher trust re-
                                                                quirements are needed for the completion of the transac-
2. Convergence of Digital Technologies                          tions.
                                                                   With such needs in mind and in an attempt to build the
Digital convergence is an evolving reality. A key point is
                                                                infrastructure for digital economies, many governments
that this convergence is not just limited to technology,
                                                                worldwide have awoken to the need to provide trusted
but also outreaches to user experiences. User interfaces,       and ubiquitous identities to their citizens [4-6]. In a space
information, and services are all converging into com-          with multiple identity providers, government-issued
puter-mediated systems that are independent of the              identity credentials stand to become the most trusted
communication channel and the device or communica-              construct. The issue that remains with such an identity is
tion tool (see also Figure 1). The user is geographically       usability, which is fraught with risks of impersonation
unbound and may interact, communicate, collaborate,             and identity theft. These risks have been addressed in
and share information in many new and different ways.           other countries, as some have implemented, and many
   Unquestionably, the body (entity) of central focus in        others are in the process of setting up, a national au-
digital environments is the person seeking the service, or      thentication infrastructure to provide seamless identifi-
in other words, the transaction initiator. Different stake-     cation that bridges multiple service channels to enhance
holders in this transaction lend their support, and the ser-    users’ experiences and enable secure digital transactions
vice provider delivers the requested service and ensures        [7].
service fulfillment. A more revolutionary form of busi-
ness operations may strike out when an irrefutable iden-        3. UAE Digital Identity System
tity is made available for the service seeker, who is ac-
tually anonymous in the digital world.                          UAE has set a clear vision for digital identity issuance in
   Our digital world spreads across several threads, but        the country. Figure 2 depicts the smart identity card is-
they all meet in their needs for identification. In other       sued by the UAE to all of its citizens and residents. This
words, the underlying enabler to our digital world is           comes as part of its national identity management pro-
identity, which is:                                             gram (also referred to as national identity management
 Uniform across multiple channels of communication;            infrastructure) that was launched in mid-2005. In the
 Standardized and usable in all contexts of identity           seven short years since its launch, UAE has been a lead-
    verification;                                               ing country in the Middle East and Africa in issuing
 Issued by a trusted identity provider that enables au-        more than 8.5 million digital certificates to its population.
                                                                This represents 96% of its total population—99.9% of
    thentication on demand across various communica
                                                                the citizens and 95% of the expatriate resident population.
    tion channels.
                                                                The digital identity provided by the UAE is composed of
                                                                a set of credentials delivered in the form of a smart card,
                                                                which includes a unique national identification number,
                                                                biometric data (fingerprints), and a pair of PKI digital




Figure 1. Convergence of digital technologies and citizen in-
terfaces.                                                                   Figure 2. UAE smart identity card.


Copyright © 2013 SciRes.                                                                                                  TI
A. M. Al-KHOURI                                                   9


certificates―one for authentication and another for sig-       confirming that the data on the card has not been tam-
nature (see also [8]).                                         pered with. That the cardholder is who he/she claims to
                                                               be is established using multiple factors of authentication,
4. UAE ID and Service Eco-System                               including a PIN verification and biometric verification.
                                                                  A software development kit (SDK) is available on the
The secure credentials issued by the UAE national iden-
tity management infrastructure are designed to support         government’s Internet portal to promote usage and inte-
their use by the citizens and residents in both physical       gration of the identity card with service providers’ sys-
and digital environments. Smart identity cards with digi-      tems in both the government and public sectors. An app-
tal credentials are provided to facilitate government and      let is also available online for cardholders to download
public sector service delivery transactions, from across       onto their personal computers to register themselves and
manned counters to transactions on the web. This is sup-       use certain e-services that require strong authentication.
ported by multi-factor authentication capabilities and         These are but a few examples of the identity card’s uses
advanced identity verification mechanisms. Figure 3            for which the SDK and the card applet have supported
shows the context of the national identity card and the        the development of auto-ID and mobile applications.
service eco-system in the UAE.                                 Thus, the UAE national ID card establishes trust in the
                                                               virtual, digital world and enables online transactions.
5. UAE National ID Card and Trust
   Establishment                                               6. Enabling Mobile Transactions
The UAE national identity card is a smart combi-card           It is important to note here that the term mobility tran-
with both contact and contactless communication capa-          scends individuals, enterprises, and the government.
bilities. The card is an instrument that is packaged to        Each entity attempts to reach out to its respective stake-
carry the physical identity details of the cardholder, along   holders and be “available” at all times and over different
with the digital ID profile, in the smart chip. The digital    communication media. Let us look at mobility from both
ID profile consists of:                                        individual and enterprise perspectives.
   1) A unique national identity number (IDN);
   2) Biometrics (fingerprints);                               6.1. Individual Mobility
   3) A pair of digital certificates issued from the popula-
                                                               As mentioned earlier, individuals in the UAE are pro-
tion certification authority (CA) of the public key infra-
                                                               vided with smart cards that carry trusted identity creden-
structure set up for this purpose.
                                                               tials issued by the government. The digital identity asso-
   Whenever a card is presented in any electronic (remote)
                                                               ciated with verifiable credentials is now available in the
transaction, the online validation center (i.e., national
                                                               cardholder’s wallet. This enables the individuals to pre-
authentication centre) validates the card by verifying its
authenticity and the expiry date of the card. Whenever         sent their IDs and credentials on demand to gain access
personal data is read from the card, the data is presented     to government or private sector services. Thus, the ID
with the Emirates Identity Authority’s digital signature       card provides verifiable credentials for a person wherever
                                                               he/she goes.

                                                               6.2. Enterprise Mobility
                                                               Since verifiable credentials are available on demand,
                                                               enterprises can now deliver services at the citizens’ con-
                                                               venience without the citizens having to physically visit
                                                               the service providers’ premises—the service providers’
                                                               premises have moved into the citizens’ living rooms. For
                                                               instance, service delivery agents carrying mobile PDAs
                                                               could verify the service recipient’s identity by reading
                                                               the identity card data stored in the chip (See Figure 4).
                                                                  Further authentication requirements could be met us-
                                                               ing PIN verification and/or biometric verification―both
                                                               in contact as well as contactless mode. The current
                                                               handheld terminals have add-on options for smart card
                                                               readers that enable card reading through contact capabili-
                                                               ties for example. The contactless capabilities of the iden-
                                                               tity card on the other hand enable the NFC mode to
         Figure 3. Identity and service eco-system.            communicate with the HHTs/PDAs.

Copyright © 2013 SciRes.                                                                                               TI
10                                                   A. M. Al-KHOURI


                                                               the accessibility of its services.
                                                                  Public Key Infrastructure is an integral part of the
                                                               UAE identity management system, with its population
                                                               certification authority (CA) providing digital certificates
                                                               for identity verification and digital signing. This capabi-
                                                               lity can be extended to provide derived credentials for
                                                               mobile users. This is a very interesting capability, since
                                                               this infrastructure can be used to provide a wireless PKI.
          Figure 4. Mobile card reader terminal.               In other words, the UAE’s government is working to
                                                               issue certificates, in conjunction with the national iden-
   Cryptographic enhancements for biometric authentica-        tity, to mobile subscribers. The telecom networks would
tion on the HHTs/PDAs are possible by means of secu-           facilitate the transport and installation of the certificates
rity access modules (SAMs), in the form of SIMs. Alter-        onto their subscribers’ phones. The private keys would
natively, the authentication infrastructure provided al-       be secured in an encrypted location on the SIM card it-
lows the HHTs to communicate securely on 3G/4G net-            self, and not in the operating system of the mobile
works and to establish the necessary crypto-environment        phones. This would tie in the mobile ID credentials to
for biometric authentication.                                  authentic national ID cardholders and valid phone sub-
   The match-on-card feature for biometric authentication      scribers.
is used in both contact and contactless modes. This fea-          This will serve two major objectives for the UAE.
ture opens numerous possibilities for enabling e-com-          First, it would provide the ability for all national identity
merce, in which identity is presented in a virtual world       cardholders to conduct secure transactions with different
and goods are delivered to real entities that are identified   service providers using their mobile phones, in a manner
authentically. A leading bank in the UAE is currently in       similar to the presence of the identity card. Digital sig-
the process of setting up a pilot system with the national     natures with time stamping would greatly enhance pro-
identity cards for biometric authentication that uses          ductivity and e-government transactions, and it would
handheld terminals to deliver bank debit/credit cards to       enable secure government communications.
their rightful owners.                                            Second, it would bring all non-identity cardholders
   Another initiative being developed is a pilot for open-     under the realm of the national identity program. Thus,
ing customer accounts using customer services officers         all visitors subscribing to mobile services would have
of banks to provide customer data by reading identity          digital certificates issued by the UAE national identity
cards and signing to open the account by using the digital     management infrastructure, which would enable them to
certificates in the identity card. This will follow the use    conduct secure mobile transactions. This would also ex-
of the identity card to conduct secure online financial        plicitly contribute to national security.
transactions, which will use digital signatures and time-         A typical example of using the mobile ID credentials
stamp capabilities. This, too, takes the banking business      derived from the UAE’s national ID card is depicted be-
to the living rooms of their customers. The UAE’s tele-        low in Figure 6.
com service providers are also coordinating to use the            The UAE has other exciting developments in the mak-
national identity cards with NFC smart phones and en-          ing that will use the post-issuance scenarios of the iden-
able mobile contactless transactions.                          tity card to provide additional mobile services. One of
                                                               the key initiatives in this direction is the ability of the na-
7. UAE National ID Card and the Future of                      tional identity infrastructure to provide OTP (one-time-
   Mobility                                                    password) functions using Open AuTHentication (OATH)
The UAE identity management infrastructure has laid a          standards. As a post-issuance service, national identity
strong foundation and framework for identity verification      cards could be loaded with an OTP applet that could then
and identity authentication. It has contributed to the de-     work in conjunction with NFC-enabled phones for an
velopment of an enhanced technological environment             OTP for secure banking and financial transactions.
that facilitates secure transactions with true mobility.
Developments in telecommunication networks and smart
                                                               8. Conclusions
phones are revolutionizing people’s lives. Figure 5 pro-       Most of the initiatives outlined here are likely to be in-
vides an overview of mobile subscribers worldwide.             stigated by other governments elsewhere in the world.
UAE has nearly 150% mobile penetration, and smart              Although some countries have initiated similar pilot pro-
phones are at nearly 100% utilization. The government is       jects, these are mainly being driven by the private sector,
planning to integrate mobile phones with its national          with little involvement from government bodies. Cer-
identity management infrastructure, in order to improve        tainly, the development of mobile networks and commu--

Copyright © 2013 SciRes.                                                                                                  TI
A. M. Al-KHOURI                                                     11




        Figure 5. Number of mobile subscribers by country, per 100 people. Source: http://chartsbin.com/view/1881.




                                      Figure 6. Wireless PKI registration and usage.

nication technologies will push governments to rethink         ever-complex needs of their populations. There will be
their “role” and definition of “identity” in the digital       no choice but to accept the concept of mobile identifica-
world.                                                         tion. The future of “mobile identification” in the informa-
   Governments are facing increasing pressure to im-           tion era will determine the competiveness of countries
prove the quality of life and address the changing and         and their readiness to survive the challenges of tomorrow.

Copyright © 2013 SciRes.                                                                                               TI
12                                                       A. M. Al-KHOURI


Let us wait and see.                                               [8]   A. M. Al-Khouri, “PKI in Government Digital Identity
                                                                         Management Systems,” European Journal of ePractice,
                                                                         No. 14, 2012, pp. 4-21.
                    REFERENCES                                     [9]   L. Haddon, “Domestication and Mobile Telephony,” In: J.
[1]   D. Royer, “Economic Aspects of Mobility and Identity,”             E. Katz, Ed., Machines that Become Us: The Social Con-
      Future of Identity in the Information Society, 2012.               text of Personal Communication Technology, Transaction
      doi:10.5121/ijmvsc.2011.2102                                       Publishers, New Brunswick, 2003, pp. 43-55.
      http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp   [10] J. Keeney, D. Lewis, D. O’Sullivan, A. Roelens, V. Wade,
      11-del11.3.economic_aspects.pdf.                                  A. Boranand and R. Richardson, “Runtime Semantic In-
[2]   A. Deuker and D. Royer, “Next Generation Networks,”               teroperability for Gathering Ontology-Based Network
      Future of Identity in the Information Society, 2009.              Context,” Network Operations and Management Sym-
      http://www.fidis.net/fileadmin/fidis/deliverables/new_deli        posium, Vancouver, April 2006, pp. 56-65.
      ver-                                                         [11] W. Kim, “On Digital Convergence and Challenges,”
      ables2/fidis-wp11-del11_11_Next_Generation_Networks.              Journal of Object Technology, Vol. 4, No. 4, 2005, pp. 67-
      final.pdf.                                                        71. doi:10.5381/jot.2005.4.4.c5
[3]   S. Srirama, M. Jarkeand W. Prinz, “Mobile Host: A Fea-            http://www.jot.fm/issues/issue_2005_05/column5.pdf.
      sibility Analysis of Mobile Web Service Provisioning,”       [12] R. Mantena and A. Sundararajan, “Competing in Markets
      Proceedings of 4th International Workshop (CAiSE’ 06)             with Digital Convergence,” 2004.
      on Ubiquitous Mobile Information and Collaboration                web-docs.stern.nyu.edu/old_web/emplibrary/04-12Sundar
      Systems (UMICS 2006), Luxembourg, 5-6 June 2006, pp.              arajan.pdf.
      942-953.                                                     [13] M. Mueller, “Digital Convergence and Its Consequen-
[4]   A. M. Al-Khouri, “An Innovative Approach for e-Gover-             ces,” The Public, Vol. 6, No. 3, 1999, pp. 11-28.
      nment Transformation,” International Journal of Manag-            http://javnost-thepublic.org/article/pdf/1999/3/2/
      ing Value and Supply Chains, Vol. 2, No. 1, 2012, pp.        [14] S. Narendra, “Connecting Identity and Mobility: A Se-
      22-43.                                                            cure, Scalable and Sustainable Mobile Wallet Approach,”
[5]   A. M. Al-Khouri, “eGovernment Strategies the Case of              IQT Quarterly, Vol. 4, No. 1, 2012, pp. 18-21.
      the United Arab Emirates (UAE),” European Journal of              http://tyfone.com/IQT_Quarterly_Summer2012_Tyfone_
      ePractice, No. 17, 2012, pp. 126-150.                             article.pdf.
[6]   A. M. Al-Khouri, “Emerging Markets and Digital Econo-        [15] J. Strassner, M. O. Foghlu, W. Donnelly and N. Agoul-
      my: Building Trust in the Virtual World,” International           mine, “Beyond the Knowledge Plane: An Inference Plane
      Journal of Innovation in the Digital Economy, Vol. 3, No.         to Support the Next Generation Internet,” Global In-
      2, 2012, pp. 57-69. doi:10.4018/jide.2012040105                   formation Infrastructure Symposium, Marrakech, 2-5 July
                                                                        2007, pp. 112-119.
[7]   A. M. Al-Khouri, “Electronic Government in the GCC
      Countries,” International Journal of Social Sciences, Vol.
      1, No. 2, 2007, pp. 83-98.




Copyright © 2013 SciRes.                                                                                                       TI

More Related Content

What's hot

Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuE-Government Center Moldova
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internetevidos
 
Joint Councils Executive Report
Joint Councils Executive ReportJoint Councils Executive Report
Joint Councils Executive ReportTim Bouma
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013Alix Murphy
 
Smartphone leading wealth managment
Smartphone leading wealth managmentSmartphone leading wealth managment
Smartphone leading wealth managmentInfosys Finacle
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingInfosys Finacle
 
How Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the FutureHow Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the FutureDamco Solutions
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Virtual Interactive Working Environments
Virtual Interactive Working EnvironmentsVirtual Interactive Working Environments
Virtual Interactive Working EnvironmentsEdward Lange
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...Ubisecure
 

What's hot (20)

Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
 
Joint Councils Executive Report
Joint Councils Executive ReportJoint Councils Executive Report
Joint Councils Executive Report
 
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
GSMA-Mobile-Identity_Case-Study_Dialog-Connect_May2013
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
Smartphone leading wealth managment
Smartphone leading wealth managmentSmartphone leading wealth managment
Smartphone leading wealth managment
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional Banking
 
How Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the FutureHow Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the Future
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
Digital Cash Overview
Digital Cash OverviewDigital Cash Overview
Digital Cash Overview
 
TGC12 e book
TGC12 e bookTGC12 e book
TGC12 e book
 
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileIDEstonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
 
Virtual Interactive Working Environments
Virtual Interactive Working EnvironmentsVirtual Interactive Working Environments
Virtual Interactive Working Environments
 
20120510 università
20120510 università20120510 università
20120510 università
 
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
 
Business booklet
Business bookletBusiness booklet
Business booklet
 

Viewers also liked

CIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile IdentityCIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile IdentityCloudIDSummit
 
Change the brand - Samsung
Change the brand - SamsungChange the brand - Samsung
Change the brand - SamsungThéo Verdier
 
pgp30108 brand management indiv assign
pgp30108 brand management indiv assignpgp30108 brand management indiv assign
pgp30108 brand management indiv assignSameer Mathur
 
Samsung Presentation on international marketing
Samsung Presentation on international marketingSamsung Presentation on international marketing
Samsung Presentation on international marketingabhiroopsur
 
samsung strategy
samsung strategysamsung strategy
samsung strategyJay Roy
 
Samsung's Product & Marketing Strategy
Samsung's Product & Marketing Strategy Samsung's Product & Marketing Strategy
Samsung's Product & Marketing Strategy Subash Franklin
 

Viewers also liked (9)

CIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile IdentityCIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile Identity
 
Change the brand - Samsung
Change the brand - SamsungChange the brand - Samsung
Change the brand - Samsung
 
pgp30108 brand management indiv assign
pgp30108 brand management indiv assignpgp30108 brand management indiv assign
pgp30108 brand management indiv assign
 
Samsung
SamsungSamsung
Samsung
 
Smartphone market studies in thailand 2015
Smartphone market studies in thailand 2015Smartphone market studies in thailand 2015
Smartphone market studies in thailand 2015
 
Samsung Presentation on international marketing
Samsung Presentation on international marketingSamsung Presentation on international marketing
Samsung Presentation on international marketing
 
Samsung Company Presentation
Samsung Company PresentationSamsung Company Presentation
Samsung Company Presentation
 
samsung strategy
samsung strategysamsung strategy
samsung strategy
 
Samsung's Product & Marketing Strategy
Samsung's Product & Marketing Strategy Samsung's Product & Marketing Strategy
Samsung's Product & Marketing Strategy
 

Similar to Identity and Mobility in a Digital World

Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
 
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...IJNSA Journal
 
Federated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilFederated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilArab Federation for Digital Economy
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSijesajournal
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Dr Lendy Spires
 
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...IJNSA Journal
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionIOSR Journals
 
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...IJNSA Journal
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsKavita Rastogi
 
Digitalization and its impact on financial transactions in India
Digitalization and its impact on financial transactions in IndiaDigitalization and its impact on financial transactions in India
Digitalization and its impact on financial transactions in IndiaRaja Sarkar
 
Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...IJECEIAES
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile paymentsBoni
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4moldovaictsummit
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedtanvir616
 

Similar to Identity and Mobility in a Digital World (20)

Optimizing Identity and Access Management (IAM) Frameworks
Optimizing Identity and Access Management (IAM) FrameworksOptimizing Identity and Access Management (IAM) Frameworks
Optimizing Identity and Access Management (IAM) Frameworks
 
Triggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply ChainTriggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply Chain
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
 
Federated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilFederated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation Council
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMS
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
Identity Management in the Age of Mobilification
Identity Management in the Age of MobilificationIdentity Management in the Age of Mobilification
Identity Management in the Age of Mobilification
 
PKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management SystemsPKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management Systems
 
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
TURNING THE DISRUPTIVE POWER OF BLOCKCHAIN IN THE INSURANCE MARKET INTO INNOV...
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...
FUTURE READY BANKING WITH SMART CONTRACTS - CBDC AND IMPACT ON THE INDIAN ECO...
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
Digitalization and its impact on financial transactions in India
Digitalization and its impact on financial transactions in IndiaDigitalization and its impact on financial transactions in India
Digitalization and its impact on financial transactions in India
 
Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...Enhancing cryptographic protection, authentication, and authorization in cell...
Enhancing cryptographic protection, authentication, and authorization in cell...
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile payments
 
Optimising mobile signature v4
Optimising mobile signature v4Optimising mobile signature v4
Optimising mobile signature v4
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
 

More from Arab Federation for Digital Economy

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربيةArab Federation for Digital Economy
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةArab Federation for Digital Economy
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Arab Federation for Digital Economy
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتArab Federation for Digital Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةArab Federation for Digital Economy
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيArab Federation for Digital Economy
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionArab Federation for Digital Economy
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةArab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟Arab Federation for Digital Economy
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...Arab Federation for Digital Economy
 

More from Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Recently uploaded

Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 

Recently uploaded (20)

Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 

Identity and Mobility in a Digital World

  • 1. Technology and Investment, 2013, 4, 7-12 doi:10.4236/ti.2013.41002 Published Online February 2013 (http://www.scirp.org/journal/ti) Identity and Mobility in a Digital World Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, UAE Email: ali.alkhouri@emiratesid.ae Received October 22, 2012; revised November 20, 2012; accepted November 27, 2012 ABSTRACT Mobile identity management has attracted the attention of both the public and private sectors in the last few years. In the context of service delivery, modern mobile communication networks offer more convenient approaches to developing citizen-centric applications. However, taking into consideration the need for compelling user authentication and identi- fication, secure communication in mobile environments remains a challenging matter. This article explores the potential role of government-issued smart identity cards in leveraging and enabling a more trusted mobile communication base. It delves into the identity management infrastructure program in the United Arab Emirates (UAE) and how the smart identity card and overall system architecture have been designed to enable trusted and secure transactions for both physical and virtual mobile communications. Keywords: Identity Management; Mobile Identity; National Authentication Infrastructure; Wireless PKI; Identity Provider; UAE 1. Introduction are some “characteristics unique to the mobile paradigm, the increased complexity of emerging handheld devices, Now more than ever, the world is transitioning drasti- the greater sensitivity to security and load related prob- cally to digital spheres, in which the best possible use is lems in wireless infrastructure and increased complexi- made of digital technologies. Our transition to the digital ties of scale” [3]. This implies that we first need to have world has been rapid and innovative, and it is now shift- unified identification criteria that allow us to identify ing us towards a more converged existence. It was not mobile and virtual individuals [2]. The role of an “iden- too long ago that discrete devices worked in isolation, tity provider” is crucial to confirm the credibility of the but now they are ubiquitous and provide us with a seam- parties participating in a service or transaction [2]. It less experience in service delivery that can be accessed should provide sufficient credentials for service provid- virtually from anywhere and at anytime. For example, ers’ relying parties to explicitly authenticate mobile users, one could submit a service request on the Web, follow thus enabling trust in the transactions being made se- and track the delivery progress using a landline on IVR, curely. call a contact center and update the request, provide ad- In this article, we examine the role that a national ditional information at a kiosk, pay using a credit card identity infrastructure could play in the facilitation of from a mobile phone, and receive the physical goods at mobile environments, with specific reference to the the designated location and a confirmation of delivery United Arab Emirates (UAE). In light of the current via SMS. This is the reality of a converged digital world. shortcomings in the existing literature about government In this digital domain, all facets of mobile identity practices in the field, we attempt to create government- management are gaining wider attention from both the published content to support the current body of know- public and private sectors. Their significance lies in their ledge that could support the development of both the contribution towards providing trust for transactions in practice and research fields. user-centric applications and their impact on the overall This article is structured as follows: Section 2 provides context of service delivery [1]. However, this is not as a short overview of the role of identity, in light of con- tranquil as it may sound. The primary challenge is that verging digital technologies; Section 3 introduces the mobile identity management systems need to be multi- UAE’s digital identity management infrastructure; Sec- laterally secure and allow appropriate user access to data, tion 4 briefly describes the UAE’s identity system and its while enabling privacy and anonymity [2]. service eco-system; Section 5 provides an overview of Referring to the specificity of the mobile services field the digital ID profile and how it helps in establishing in modern networks, Srirama et al. (2006) state that there trust in the e-transactions; Section 6 presents how the Copyright © 2013 SciRes. TI
  • 2. 8 A. M. Al-KHOURI UAE identity management system supports mobility, In reality, there are multiple providers of identity for both from individual and enterprise perspectives; Section any given entity, all jostling for space, which enable 7 looks at some government plans that attempt to inte- cross verification and authentication over diverse ser- grate mobile phones with its national identity manage- vices. Thus, as long as the services are virtual, inter-de- ment infrastructure to improve the accessibility of its pendent identity verification can suffice. Yet, with real services; and finally, Section 8 concludes with some services like physical goods, secure communication en- perspectives. ablement, and financial transactions, higher trust re- quirements are needed for the completion of the transac- 2. Convergence of Digital Technologies tions. With such needs in mind and in an attempt to build the Digital convergence is an evolving reality. A key point is infrastructure for digital economies, many governments that this convergence is not just limited to technology, worldwide have awoken to the need to provide trusted but also outreaches to user experiences. User interfaces, and ubiquitous identities to their citizens [4-6]. In a space information, and services are all converging into com- with multiple identity providers, government-issued puter-mediated systems that are independent of the identity credentials stand to become the most trusted communication channel and the device or communica- construct. The issue that remains with such an identity is tion tool (see also Figure 1). The user is geographically usability, which is fraught with risks of impersonation unbound and may interact, communicate, collaborate, and identity theft. These risks have been addressed in and share information in many new and different ways. other countries, as some have implemented, and many Unquestionably, the body (entity) of central focus in others are in the process of setting up, a national au- digital environments is the person seeking the service, or thentication infrastructure to provide seamless identifi- in other words, the transaction initiator. Different stake- cation that bridges multiple service channels to enhance holders in this transaction lend their support, and the ser- users’ experiences and enable secure digital transactions vice provider delivers the requested service and ensures [7]. service fulfillment. A more revolutionary form of busi- ness operations may strike out when an irrefutable iden- 3. UAE Digital Identity System tity is made available for the service seeker, who is ac- tually anonymous in the digital world. UAE has set a clear vision for digital identity issuance in Our digital world spreads across several threads, but the country. Figure 2 depicts the smart identity card is- they all meet in their needs for identification. In other sued by the UAE to all of its citizens and residents. This words, the underlying enabler to our digital world is comes as part of its national identity management pro- identity, which is: gram (also referred to as national identity management  Uniform across multiple channels of communication; infrastructure) that was launched in mid-2005. In the  Standardized and usable in all contexts of identity seven short years since its launch, UAE has been a lead- verification; ing country in the Middle East and Africa in issuing  Issued by a trusted identity provider that enables au- more than 8.5 million digital certificates to its population. This represents 96% of its total population—99.9% of thentication on demand across various communica the citizens and 95% of the expatriate resident population. tion channels. The digital identity provided by the UAE is composed of a set of credentials delivered in the form of a smart card, which includes a unique national identification number, biometric data (fingerprints), and a pair of PKI digital Figure 1. Convergence of digital technologies and citizen in- terfaces. Figure 2. UAE smart identity card. Copyright © 2013 SciRes. TI
  • 3. A. M. Al-KHOURI 9 certificates―one for authentication and another for sig- confirming that the data on the card has not been tam- nature (see also [8]). pered with. That the cardholder is who he/she claims to be is established using multiple factors of authentication, 4. UAE ID and Service Eco-System including a PIN verification and biometric verification. A software development kit (SDK) is available on the The secure credentials issued by the UAE national iden- tity management infrastructure are designed to support government’s Internet portal to promote usage and inte- their use by the citizens and residents in both physical gration of the identity card with service providers’ sys- and digital environments. Smart identity cards with digi- tems in both the government and public sectors. An app- tal credentials are provided to facilitate government and let is also available online for cardholders to download public sector service delivery transactions, from across onto their personal computers to register themselves and manned counters to transactions on the web. This is sup- use certain e-services that require strong authentication. ported by multi-factor authentication capabilities and These are but a few examples of the identity card’s uses advanced identity verification mechanisms. Figure 3 for which the SDK and the card applet have supported shows the context of the national identity card and the the development of auto-ID and mobile applications. service eco-system in the UAE. Thus, the UAE national ID card establishes trust in the virtual, digital world and enables online transactions. 5. UAE National ID Card and Trust Establishment 6. Enabling Mobile Transactions The UAE national identity card is a smart combi-card It is important to note here that the term mobility tran- with both contact and contactless communication capa- scends individuals, enterprises, and the government. bilities. The card is an instrument that is packaged to Each entity attempts to reach out to its respective stake- carry the physical identity details of the cardholder, along holders and be “available” at all times and over different with the digital ID profile, in the smart chip. The digital communication media. Let us look at mobility from both ID profile consists of: individual and enterprise perspectives. 1) A unique national identity number (IDN); 2) Biometrics (fingerprints); 6.1. Individual Mobility 3) A pair of digital certificates issued from the popula- As mentioned earlier, individuals in the UAE are pro- tion certification authority (CA) of the public key infra- vided with smart cards that carry trusted identity creden- structure set up for this purpose. tials issued by the government. The digital identity asso- Whenever a card is presented in any electronic (remote) ciated with verifiable credentials is now available in the transaction, the online validation center (i.e., national cardholder’s wallet. This enables the individuals to pre- authentication centre) validates the card by verifying its authenticity and the expiry date of the card. Whenever sent their IDs and credentials on demand to gain access personal data is read from the card, the data is presented to government or private sector services. Thus, the ID with the Emirates Identity Authority’s digital signature card provides verifiable credentials for a person wherever he/she goes. 6.2. Enterprise Mobility Since verifiable credentials are available on demand, enterprises can now deliver services at the citizens’ con- venience without the citizens having to physically visit the service providers’ premises—the service providers’ premises have moved into the citizens’ living rooms. For instance, service delivery agents carrying mobile PDAs could verify the service recipient’s identity by reading the identity card data stored in the chip (See Figure 4). Further authentication requirements could be met us- ing PIN verification and/or biometric verification―both in contact as well as contactless mode. The current handheld terminals have add-on options for smart card readers that enable card reading through contact capabili- ties for example. The contactless capabilities of the iden- tity card on the other hand enable the NFC mode to Figure 3. Identity and service eco-system. communicate with the HHTs/PDAs. Copyright © 2013 SciRes. TI
  • 4. 10 A. M. Al-KHOURI the accessibility of its services. Public Key Infrastructure is an integral part of the UAE identity management system, with its population certification authority (CA) providing digital certificates for identity verification and digital signing. This capabi- lity can be extended to provide derived credentials for mobile users. This is a very interesting capability, since this infrastructure can be used to provide a wireless PKI. Figure 4. Mobile card reader terminal. In other words, the UAE’s government is working to issue certificates, in conjunction with the national iden- Cryptographic enhancements for biometric authentica- tity, to mobile subscribers. The telecom networks would tion on the HHTs/PDAs are possible by means of secu- facilitate the transport and installation of the certificates rity access modules (SAMs), in the form of SIMs. Alter- onto their subscribers’ phones. The private keys would natively, the authentication infrastructure provided al- be secured in an encrypted location on the SIM card it- lows the HHTs to communicate securely on 3G/4G net- self, and not in the operating system of the mobile works and to establish the necessary crypto-environment phones. This would tie in the mobile ID credentials to for biometric authentication. authentic national ID cardholders and valid phone sub- The match-on-card feature for biometric authentication scribers. is used in both contact and contactless modes. This fea- This will serve two major objectives for the UAE. ture opens numerous possibilities for enabling e-com- First, it would provide the ability for all national identity merce, in which identity is presented in a virtual world cardholders to conduct secure transactions with different and goods are delivered to real entities that are identified service providers using their mobile phones, in a manner authentically. A leading bank in the UAE is currently in similar to the presence of the identity card. Digital sig- the process of setting up a pilot system with the national natures with time stamping would greatly enhance pro- identity cards for biometric authentication that uses ductivity and e-government transactions, and it would handheld terminals to deliver bank debit/credit cards to enable secure government communications. their rightful owners. Second, it would bring all non-identity cardholders Another initiative being developed is a pilot for open- under the realm of the national identity program. Thus, ing customer accounts using customer services officers all visitors subscribing to mobile services would have of banks to provide customer data by reading identity digital certificates issued by the UAE national identity cards and signing to open the account by using the digital management infrastructure, which would enable them to certificates in the identity card. This will follow the use conduct secure mobile transactions. This would also ex- of the identity card to conduct secure online financial plicitly contribute to national security. transactions, which will use digital signatures and time- A typical example of using the mobile ID credentials stamp capabilities. This, too, takes the banking business derived from the UAE’s national ID card is depicted be- to the living rooms of their customers. The UAE’s tele- low in Figure 6. com service providers are also coordinating to use the The UAE has other exciting developments in the mak- national identity cards with NFC smart phones and en- ing that will use the post-issuance scenarios of the iden- able mobile contactless transactions. tity card to provide additional mobile services. One of the key initiatives in this direction is the ability of the na- 7. UAE National ID Card and the Future of tional identity infrastructure to provide OTP (one-time- Mobility password) functions using Open AuTHentication (OATH) The UAE identity management infrastructure has laid a standards. As a post-issuance service, national identity strong foundation and framework for identity verification cards could be loaded with an OTP applet that could then and identity authentication. It has contributed to the de- work in conjunction with NFC-enabled phones for an velopment of an enhanced technological environment OTP for secure banking and financial transactions. that facilitates secure transactions with true mobility. Developments in telecommunication networks and smart 8. Conclusions phones are revolutionizing people’s lives. Figure 5 pro- Most of the initiatives outlined here are likely to be in- vides an overview of mobile subscribers worldwide. stigated by other governments elsewhere in the world. UAE has nearly 150% mobile penetration, and smart Although some countries have initiated similar pilot pro- phones are at nearly 100% utilization. The government is jects, these are mainly being driven by the private sector, planning to integrate mobile phones with its national with little involvement from government bodies. Cer- identity management infrastructure, in order to improve tainly, the development of mobile networks and commu-- Copyright © 2013 SciRes. TI
  • 5. A. M. Al-KHOURI 11 Figure 5. Number of mobile subscribers by country, per 100 people. Source: http://chartsbin.com/view/1881. Figure 6. Wireless PKI registration and usage. nication technologies will push governments to rethink ever-complex needs of their populations. There will be their “role” and definition of “identity” in the digital no choice but to accept the concept of mobile identifica- world. tion. The future of “mobile identification” in the informa- Governments are facing increasing pressure to im- tion era will determine the competiveness of countries prove the quality of life and address the changing and and their readiness to survive the challenges of tomorrow. Copyright © 2013 SciRes. TI
  • 6. 12 A. M. Al-KHOURI Let us wait and see. [8] A. M. Al-Khouri, “PKI in Government Digital Identity Management Systems,” European Journal of ePractice, No. 14, 2012, pp. 4-21. REFERENCES [9] L. Haddon, “Domestication and Mobile Telephony,” In: J. [1] D. Royer, “Economic Aspects of Mobility and Identity,” E. Katz, Ed., Machines that Become Us: The Social Con- Future of Identity in the Information Society, 2012. text of Personal Communication Technology, Transaction doi:10.5121/ijmvsc.2011.2102 Publishers, New Brunswick, 2003, pp. 43-55. http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp [10] J. Keeney, D. Lewis, D. O’Sullivan, A. Roelens, V. Wade, 11-del11.3.economic_aspects.pdf. A. Boranand and R. Richardson, “Runtime Semantic In- [2] A. Deuker and D. Royer, “Next Generation Networks,” teroperability for Gathering Ontology-Based Network Future of Identity in the Information Society, 2009. Context,” Network Operations and Management Sym- http://www.fidis.net/fileadmin/fidis/deliverables/new_deli posium, Vancouver, April 2006, pp. 56-65. ver- [11] W. Kim, “On Digital Convergence and Challenges,” ables2/fidis-wp11-del11_11_Next_Generation_Networks. Journal of Object Technology, Vol. 4, No. 4, 2005, pp. 67- final.pdf. 71. doi:10.5381/jot.2005.4.4.c5 [3] S. Srirama, M. Jarkeand W. Prinz, “Mobile Host: A Fea- http://www.jot.fm/issues/issue_2005_05/column5.pdf. sibility Analysis of Mobile Web Service Provisioning,” [12] R. Mantena and A. Sundararajan, “Competing in Markets Proceedings of 4th International Workshop (CAiSE’ 06) with Digital Convergence,” 2004. on Ubiquitous Mobile Information and Collaboration web-docs.stern.nyu.edu/old_web/emplibrary/04-12Sundar Systems (UMICS 2006), Luxembourg, 5-6 June 2006, pp. arajan.pdf. 942-953. [13] M. Mueller, “Digital Convergence and Its Consequen- [4] A. M. Al-Khouri, “An Innovative Approach for e-Gover- ces,” The Public, Vol. 6, No. 3, 1999, pp. 11-28. nment Transformation,” International Journal of Manag- http://javnost-thepublic.org/article/pdf/1999/3/2/ ing Value and Supply Chains, Vol. 2, No. 1, 2012, pp. [14] S. Narendra, “Connecting Identity and Mobility: A Se- 22-43. cure, Scalable and Sustainable Mobile Wallet Approach,” [5] A. M. Al-Khouri, “eGovernment Strategies the Case of IQT Quarterly, Vol. 4, No. 1, 2012, pp. 18-21. the United Arab Emirates (UAE),” European Journal of http://tyfone.com/IQT_Quarterly_Summer2012_Tyfone_ ePractice, No. 17, 2012, pp. 126-150. article.pdf. [6] A. M. Al-Khouri, “Emerging Markets and Digital Econo- [15] J. Strassner, M. O. Foghlu, W. Donnelly and N. Agoul- my: Building Trust in the Virtual World,” International mine, “Beyond the Knowledge Plane: An Inference Plane Journal of Innovation in the Digital Economy, Vol. 3, No. to Support the Next Generation Internet,” Global In- 2, 2012, pp. 57-69. doi:10.4018/jide.2012040105 formation Infrastructure Symposium, Marrakech, 2-5 July 2007, pp. 112-119. [7] A. M. Al-Khouri, “Electronic Government in the GCC Countries,” International Journal of Social Sciences, Vol. 1, No. 2, 2007, pp. 83-98. Copyright © 2013 SciRes. TI