[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Identity services in the cloud

September 2010 | 18 pages | ID: I7FA630F2E0EN
Ovum

US$ 895.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
License Price: US$ 2,240.00

We are entering an exciting period in the development of Internet identity services. They promise greater convenience for users, higher conversion rates from enquiries to sales for Internet merchants, and greater assurance for Internet-facing businesses, including government websites. They offer increased scope for performing trusted and high-value web transactions. However, “identity” comprises a portfolio of personal information – it is much more than establishing a user’s name – and the centralization of a user’s Internet activities around a single identity provider increases the risk of privacy violations and fraud based on impersonating the real user. The industry must address the new risks that come with this change.

SUMMARY

Impact
Ovum view
Key messages

THE NEED FOR AN INTERNET IDENTITY IS NOW RECOGNIZED

The Internet identity ecosystem
The business imperative
The challenges
Where the need lies
Internet identity is gaining momentum
Privacy and security concerns
The high-assurance identity market needs to move out of the public sector

SEVERAL LEVELS OF IDENTITY ASSURANCE ARE NEEDED

Online identity needs to follow successful models from the physical world
Online identity requirements
OpenID shows the opportunities and the challenges
Leveraging government standards
The PIV standards
EU OpenID trust profile project

LEGAL AND COMMERCIAL ISSUES ARE STILL OF PARAMOUNT IMPORTANCE

Business case development
Commercial models
Assurance versus privacy
Banking regulations
Identity brokers

TECHNOLOGY IS BEING DEVELOPED FOR INTERNET IDENTITY

Open Identity Trust Framework
OASIS ID Trust
U-Prove
National ID cards and mobile phone SIM cards
Combining PKI and IdM
Orange ID selector

RECOMMENDATIONS

Recommendations for enterprises
Recommendations for suppliers

APPENDIX

Further reading
Methodology

LIST OF FIGURES

Figure 1: Internet identity ecosystem


More Publications