Technalysis Research
 
Previous Blogs

August 2, 2016
IoT Strategies Going Vertical

July 29, 2016
Yahoo-Verizon Deal

July 26, 2016
Creating New Worlds

July 19, 2016
The State of Smart Homes

July 15, 2016
US PC Market Shows Improvement

July 12, 2016
Pokemon Go is an AR Watershed

July 5, 2016
Car Wars: The Battle for Automotive Tech

July 1, 2016
Microsoft Announces Windows 10 Anniversary Update

June 28, 2016
Digital Audio Progress Highlights Tech’s More Human Future

June 24, 2016
HP Inc. Offers Thinnest Notebook

June 21, 2016
IoT Faces Challenges with Scale

June 17, 2016
Snapchat Opens Up New Options for Marketers

June 14, 2016
Apple Drives Apps into Services

June 7, 2016
The Evolution of Cloud Computing

May 31, 2016
Voice-Based Computing with Digital Assistants

May 24, 2016
Turning Makers into Manufacturers

May 20, 2016
Google Brings Android Apps to Chrome

May 17, 2016
Virtual Reality Brings New Life…to Desktops?

May 10, 2016
The Biggest Question for IoT…Who Pays?

May 3, 2016
Learning About Deep Learning

April 26, 2016
The End of Hardware?

April 19, 2016
Enterprise IoT Drives Indirect Savings

April 12, 2016
TidBits About Bots

April 5, 2016
VR in the Cloud

March 29, 2016
IOT Will Drive Tech Outside of IT

March 22, 2016
Apple Moves to Middle Age

March 15, 2016
The Invisible Platform

March 8, 2016
Bringing Makers to Business

March 1, 2016
IOT Coming Into Focus

February 23, 2016
The Devices Formerly Known as Smartphones

February 16, 2016
Can Web Music Survive?

February 9, 2016
The Growing Choices in Wireless Connectivity

February 2, 2016
What if Twitter Died?

January 26, 2016
Smart Home Safety Evolution: Physical to Digital

January 19, 2016
The Promise and Confusion of USB Type-C

January 12, 2016
The Hottest Computing Device? Cars

January 5, 2016
Top Tech Predictions for 2016, Part 2

December 30, 2015
Top Tech Predictions for 2016, Part 1

2015 Blogs

2014 Blogs


2013 Blogs

















TECHnalysis Research Blog

August 9, 2016
The Digital Identity Dilemma

By Bob O'Donnell

On the one hand, the problem seems obvious. We all need some kind of consistent digital identity (think virtual ID “card”) that can identify and authenticate us not only to all our devices, but to all our online services, commerce and banking accounts, and essentially anywhere where we need to digitally, or even physically, verify who we are.

Actually solving that problem, it turns out, is pretty hard. For one, any kind of digital identity solution needs to be platform and device independent. Sure, it’s fine to be able to swipe into your phone with a fingerprint reader, but most people own more than just a smartphone, for example and, in many cases, they run different on different platforms.

Plus, merely logging into the device doesn’t transfer your credentials to all the password-protected websites you use, services you log into, etc. Sure, there’s been some useful improvement in this area over the last few years, but we’re still a long way from the nirvana of a what I like to call a portable digital identity.

Think of a portable digital identity as something akin to a digital passport that could not only identify you to known locations, but unknown situations as well. Want to be able to get immediate access to your Spotify account while using grandma’s PC? As long as she has internet access, no problem.

One of the most obvious benefits of this type of digital ID would be the eventual abolition (at least, in theory!) of passwords. We all know how horrendously broken the concept is and the amount of money, time and effort wasted—not to mention the incredible amount of frustration they regularly generate—is now measured in extraordinarily large numbers, both for individuals and companies.

Recently, there have been a number of important steps made toward achieving more universal digital identities. Key among them is the work done by industry organization the FIDO Alliance, whose members include Microsoft, Google, Intel, Qualcomm and Samsung, among many others, but noticeably lacks Apple. Last fall, the organization submitted their FIDO 2.0 Web APIs to the W3C internet standards body as part of an effort to allow digital identity and authentication credentials to be passed from device to device and device to website.

Essentially, this will enable people to leverage technologies like biometrics—using fingerprints, face recognition, iris scanning (like on Samsung’s new Galaxy Note 7), and more—to not only identify you to the local device, but to other devices as well. Even better, it will enable apps, websites and other services to seamlessly recognize you via that same identity verification. Once it’s widely adopted, this could be the ultimate “friction-removing” technology. These Web APIs should be able to dramatically change how quickly and easily we use web services, make online transactions, and much more, all while dramatically decreasing the potential for fraud and identity theft.

Microsoft provided an early version of support for these standards in the enhanced version of Windows Hello that’s built into the new Anniversary Update of Windows 10. In fact, Microsoft is supporting what they call the Windows Hello Companion Device Framework to allow external devices, such as wearables or other Bluetooth-equipped devices with biometric sensors, to enable biometric security not only to devices that don’t have it, but to extend that level of verification to any sites or services which support FIDO 2.0.

Of course, the security questions about how this all works and how effective it will really be in the real world have been debated quite a bit. While it’s impossible to say that it’s hack-proof, the good news is that the entire effort has been built with worst-case scenarios in mind.

The technology used to enable the security can be very complex, but there are a few basic concepts worth mentioning. To start, all these efforts begin with a hardware root of trust on any end user device, such as a TPM (Trusted Platform Module), or some other kind of digital security chip, that is physically isolated from the main processor and OS. Leveraging virtualization or similar software isolation technologies, the information used to identify and verify you is encrypted and kept separate from main memory, making it extremely difficult to get access to. In fact, in most situations, it would require physically tapping into the device, which greatly reduces the risk threat in most situations. Plus, that identifying information isn’t directly passed along, but instead is only used to start the process of verification.

The net result is that highly personal biometric information is not only extremely hard to acquire, but can’t be used to directly tap into an account in the same way that a stolen password potentially can.

Even with all these efforts, we’re several steps away from a truly standardized, universal digital identity, but it’s clear that we’re much closer to the goal than even just a year ago. By later 2016 or early 2017, the W3C is likely to approve the FIDO 2.0 Web APIs and that’s bound to create some strong momentum around these extremely important standards. Your portable digital identity is nearly here….

Here's a link to the column: https://techpinions.com/the-digital-identity-dilemma/46778

Bob O’Donnell is the president and chief analyst of TECHnalysis Research, LLC a market research firm that provides strategic consulting and market research services to the technology industry and professional financial community. You can follow him on Twitter @bobodtech.

Podcasts
Leveraging more than 10 years of award-winning, professional radio experience, TECHnalysis Research participates in a video-based podcast called Everything Technology.
LEARN MORE
  Research Offerings
TECHnalysis Research offers a wide range of research deliverables that you can read about here.
READ MORE