Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management
Table of Contents
Executive Summary
In this deliverable, Trusted Computing (TC) technology is introduced to the reader, with an overview of the main concepts, functionalities and features of general TC hardware and software. The overview includes also the TC specifications of the Trusted Computing Group – a specification and standardization body dedicated for Trusted Computing – in addition to other industrial and academic efforts and projects for further development of the technology. After touching on some application scenarios and social and legal aspects of TC, we shed the light on implications of TC on identity and identity management with regard to enhancing digital identification, possible consumer privacy violation, and providing anonymity in TC-based infrastructures. We propose ideas on how the TC concepts and features can influence identification, identity management systems, privacy and anonymity. We then give a brief use case scenario of TC-based identity management across several domains of identification. TC is a new technology aimed at bringing trust in computing platforms to a higher level by providing evidence about the integrity of a platform to both, the platform’s owner and to arbitrary third parties. While the concepts underlying Trusted Computing date back to the 1960s, the technology emerged when adopted by the Trusted Computing Group (TCG), formerly the Trusted Computing Platform Alliance (TCPA). The three main components of the TCG proposal are under focus, namely the Trusted Platform Module (TPM), a tamper-resistant hardware chip, a kind of (protected) pre-BIOS called the Core Root of Trust for Measurement (CRTM), and a support software called TCG Software Stack (TSS). Those are continuously subject to research, development and implementations by TPM Manufacturers, system integrators and leading industrial and academic open-source projects. Although TC seems to be a promising technology, some aspects of it still raise problems and reservations from consumers, but also from academic researchers. The fears lie in several aspects like the possibility of restrictive digital content control by content providers by means of technologies such as Digital Rights Management, “lock-in” of specific software on consumer platforms by software providers, restricting the installation of similar software and reducing interoperability, and consumer privacy breach due to some specified protocols requiring disclosure of identification information to Trusted Third Parties. From a legal perspective, some possible implications of TC might not be completely conformant with legislations such as the Copyright Act and the Competition Act. Nevertheless, TC seems to give ground for new business use cases in various fields such as Distributed Policy Enforcement, secure end-user systems and embedded security. In particular, TC can present advantages in the areas of Identification and Identity Management, and can enable new solutions in those fields. Some features and protocols defined by the TCG can have substantial effect on various aspects of identification and can hence enable new business cases. Functionalities can also affect anonymity aspects using TC-based platforms; other can enhance identification depending on the use of the features. For this reason, national security agencies, industrial and standardisation bodies as well as the research community are all encouraged to further investigate the advantages of TC with respect to digital identity, identification and identity management, and to envision more developed use cases of the technology. |
| 1 / 38 |
