Whitepaper oversigt

Authentication without Identification: How to Protect On-Line Identity

Authentication without Identification: How to Protect On-Line Identity
Today, authentication on electronic media is typically done by identification followed by authorization. Users are forced to constantly identify themselves, leaving a trail of personal information. Methods for user authentication are typically weak. Both put our security and privacy at risk. In this talk we present authentication mechanisms that let service provider authorize users by requesting only the necessary amount of the user. We show how easy it is to use these advanced privacy protecting authentication mechanisms and how they make it easier for service providers to protect user data. Finally, we will discuss a number of use cases. (99 words)
download
Ved download af dette whitepaper accepterer du, at leverandøren af whitepaperet kontakter dig på din oplyste e-mailadresse eller telefonnummer med yderligere information om leverandørens ydelser relateret til whitepaperet
FacebookTwitterLinkedinMailPrint
Funktionen:
Udgivelsesdatoen: 04-05-2016
Filtype: pdf
Dokument: Præsentation
Sprog: EN
Udgivet af: IBM

Også interessant

Arrangør
  
Partner