Like what you've read?

On Line Opinion is the only Australian site where you get all sides of the story. We don't
charge, but we need your support. Here�s how you can help.

  • Advertise

    We have a monthly audience of 70,000 and advertising packages from $200 a month.

  • Volunteer

    We always need commissioning editors and sub-editors.

  • Contribute

    Got something to say? Submit an essay.


 The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
On Line Opinion logo ON LINE OPINION - Australia's e-journal of social and political debate

Subscribe!
Subscribe





On Line Opinion is a not-for-profit publication and relies on the generosity of its sponsors, editors and contributors. If you would like to help, contact us.
___________

Syndicate
RSS/XML


RSS 2.0

How to make a privacy-friendly national ID card

By Kevin Cox - posted Tuesday, 2 August 2005


Most people agree that there are benefits to the individual in having an ID card when they need to establish their identity. The privacy problems with ID cards do not come from the ID card itself, but from data collected about an individual by different organisations and then collated using the ID card number as the link between different sets of data.

A solution to the problem is to remove any possibility of a link between the ID card and other data. One way this can be done and to protect privacy is to use an identity provider in a system with the following characteristics:

  • Assume we have a national ID card with limited information of photograph, name and date of birth. It has a chip with an encrypted identification number. There is no visible ID number.
  • Identification cards are voluntary but may be required for certain activities, such as air travel, where a person has to be physically present and it is important to establish his or her identity.
  • We make it impossible and illegal to store ID card information in other data repositories without the individual’s permission.
  • Each individual has a set of online authenticated verified identifying data that they control, they supply and which requires their permission to access. We call this, together with the programs that manipulate the data, an 'edentiti'.
  • When an organisation needs information about a person then the edentiti, with permission from the individual, gives the minimum information needed and gives a new number that the organisation is to use for identification. Thus an individual is known by a different number in different organisations which is in turn is different from the ID card encrypted number.
Advertisement

The following diagram illustrates how such a system will protect privacy and yet still allow the convenience of an identification card.

Edentiti diagram 

In this system an ID card is just another data store like a bank record. It has a particular purpose which is to be a portable identification device in much the same way as we use a driver's licence.

The advantage of this system is that data about an individual is kept in separate data stores that can ONLY be linked through edentiti where the individual controls all accesses. This permits the individual to keep control and more important, to know what information others hold on them. This contrasts with the current situation where organisations can get information about you from a variety of sources without your knowledge and worse - collate the data.

Edentiti is a system which protects privacy by the individual taking control over their own identity. It is an instance of what the IT industry calls an identity provider. Identity providers are part of an open standards movement to remove anonymity from the Internet in cases where anonymity is a problem.

Using any identity provider, including edentiti, is voluntary. That is, you do not have to have one - but if you want particular services then you can use it as a way of establishing who you are.

Advertisement

Edentities are created in much the same way that people now get 100-point authenticated accounts with a bank. The difference is that an individual creates their online identity and has full control over it and it includes more than a record of paper documents. An edentiti includes biometrics of face and voice prints, secrets such as pin numbers and identifiers of things the individual owns, such as phone numbers. It also belongs to the individual and not to some other organisation like a bank. The 100 points and other information are checked by an independent party so others can be confident you are who you say you are.

Once you have an edentiti you can use it for many purposes. For example, you can use it to make an electronic signature on an online form. Assume you have an edentiti, assume you have stored a secret pin, and assume you have stored your telephone number on edentiti. When you click on “sign here”, edentiti calls you on your phone and asks you to enter your pin number, which you do. It is the same as a written signature as you have to both possess the phone and know the pin number to make your electronic mark. How secure you want to make it depends on what you are prepared to store in your edentiti. It may be that your voice print has to match, or that an image of you on a webcam, has to match your stored picture.

Another use is for edentiti to deliver your credentials to a prospective employer. What happens with edentiti is that you ask the university or educational institution to deliver the appropriate documents to the prospective employer. They receive your credentials directly from the institution rather than from you - but it is all under your control.

  1. Pages:
  2. Page 1
  3. 2
  4. All


Discuss in our Forums

See what other readers are saying about this article!

Click here to read & post comments.

12 posts so far.

Share this:
reddit this reddit thisbookmark with del.icio.us Del.icio.usdigg thisseed newsvineSeed NewsvineStumbleUpon StumbleUponsubmit to propellerkwoff it

About the Author

Dr Kevin Cox is an entrepreneur. Previously he has taught Information Systems in Canberra and Hong Kong and worked with computers for various multinationals in Australia, the USA and Indonesia.

Other articles by this Author

All articles by Kevin Cox

Creative Commons LicenseThis work is licensed under a Creative Commons License.

Article Tools
Comment 12 comments
Print Printable version
Subscribe Subscribe
Email Email a friend
Advertisement

About Us Search Discuss Feedback Legals Privacy