Blog post -

Identity data capture and validation is key

This week I had the pleasure of visiting NORSIS event IDentitet 2016 in Oslo. Very well structured the event started with presentations around the capturing and validation of identity data which is fundamental for the trust in eIDs (and of course other types of credentials). Many good points around the difficulties in validating physical identity documents that are later used to issue digital identities, points that also validated with real life examples in the next sessions around Identity Theft.

In the identity theft session we got to hear Marthe Lunde, a victim of identity theft, speak about her experiences from several aspects and how easy it is to perform an overtake of some ones identity due to lack to good controls and secure distribution and use of identity information, in Marthe Lunde’s case it resulted in a number of purchases for a significant amount and over 200 hours work for Marthe to reclaim her identity and eliminate the damage the criminal caused. I especially noted the inability from the society and the merchants to help Marthe, in the end she has not caused this, she is a victim of weak controls and processes and of course criminal activities.

The later sessions went over to the digital identity side but with links back to the earlier session with a clear message that we need a secure capturing and validation of the initial identity data and if we then link that to a secure digital identity which can present the initial data in the digital channel we can raise the protection of users and reduce identity theft significantly. There is obviously so many great services we can build on an improved system that combines a secure identity capturing and validation with a convenient eIDs in order to establish a trusted identity that can work across borders as well. But to establish the trust it is necessary to address the complete chain not just the indiviudal parts.

Per Hägerö

Read more about NORSIS here 

Topics

  • Data, Telecom, IT

Regions

  • England

Contacts

Related content

  • Six themes drive identity management in 2016

    For neXus, the leading global provider of security solutions and services, identity management will be one of the central issues in the context of IT security in 2016. The trends such as continuous flexibilization in the working environment, new forms of customer communication and the growing number of cyber-attacks are responsible for this.

  • neXus appoints new CFO

    Magnus Karlsson joins neXus as CFO on February 22, 2016, becoming a new member of the group management. Magnus succeeds Björn Johansson, who has decided to seek new challenges outside the group after nine years with neXus.

  • neXus supplies service card solutions to municipality of Ale

    Municipality of Ale has negotiated a solution for the production and administration of service cards for all its employees. The management of the municipality wanted all personnel to have secure identification that could also be used for secure login, and for access, print-on-demand etc.

  • Carolen Ytander new CMO for neXus

    neXus is boosting its company management by recruiting Carolen Ytander to head up marketing, communications and strategic HR. Carolen most recently worked at Vattenfall, where she held a number of executive positions, including Head of Nordic Marketing.

  • Explosion in IoT reveals risk of massive black market

    In a recent report Gartner predicts that by 2020 over 50% of new major business process and system will incorporate some element of the Internet of Things. From a security perspective this growth will ...

  • The SCIM standards just grew up to become RFC's

    Integrity and simplicity for both users and IT-departments just took a huge step forward on the Internet. The SCIM specifications, System for Cross-Domain Identity Management, are now published as publications by the Internet Engineering Taskforce (IETF) as RFC7643 and RFC7644. At neXus we are super proud because we have been playing a key part of the specifications.

  • The Hacked Jeep is not alone

    A recent article in Wired shows how the threat is real and even though causing accidents might not be the prime target it points out that we need to take what we have learnt when opening up systems and API to the IoT world and not just care about remote access to IoT, its also about how different objects in the near perimeter act and are authorized to act.

  • Server Name Indication and Hybrid Access Gateway

    ​SNI is an extension to TLS that has been around for a while, since 2003, but is becoming more and more important as installations become multi tenant with customers from completely different organizations.

  • Identities without borders

    ​Imagine using your Swedish electronic signature for applying for a building permit for your summer home in Spain? It can soon turn into reality as the new EU regulation eIDAS is being introduced across Europe, enabling national electronic signatures to work across borders in the union.

  • Securing banking solutions

    ​How can neXus help securing banking solutions for authentication, verification and signatures for the next generation of banking services? Meeting and attracting new customers in a disruptive banking market thru new mobile channels is a big challenge!