Upload
derick-hicks
View
218
Download
0
Embed Size (px)
Citation preview
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 1 / 14
Identity in the Identity in the Ambient Intelligence EnvironmentAmbient Intelligence Environment
Sabine Delaitre
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 2 / 14
Summary
Ambient Intelligence (AmI) Environment
Identity in AmI Space
Scenario
Use Cases
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 3 / 14
Ambient Intelligence Environment
Key technologiesUbiquitous Computing Ubiquitous CommunicationIntelligent user friendly Interfaces
PurposeDeliver seamless applications and services to citizens
User-driven approachBetter integration of technology into our environment
Understand how people interact with technology Indispensable component: user context
Characteristics to be achievedUbiquity, awareness, transparency, intelligent, sensitive, adaptive and responsive
Or how to enrich the quality of everyday life.
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 4 / 14
SocialTechnologic
Protection of personal
data
Common standards to permit interoperation
Seamless communications
infrastructure
Use in a natural way
Enhancing opportunities (dev. of app. & provision
to market)
Level of personal control
over AmI
Ambient Intelligence Environment
EconomicLegal
Trusted network
Some drivers for scenario development
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 5 / 14
Identity in AmI Space (1/2) Identity information
Offline Identity Related to appearance (hair, eyes colour, glasses) Social information (name, postal address, phone number) Identity tokens (passport, visa, credit card, security social number, bank account number)
Digital Identity Related to appearance (biometrics template) Social Information (nickname, e-mail address, IP address) Identity tokens (digital signature, digital certificate)
Identity to bridge offline and digital Identities Knowledge-based Identification (password, PIN) Related to the user context (profile, user preferences)
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 6 / 14
Identity in AmI Space (2/2)
Identity information concerns
Interoperability Identity information should be understandable by
any device
Privacy Identity information should be used by authorized devices User should be able to control /specify which information to disclose and to whom
Data protection
Storage Centralized or not
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 7 / 14
Scenario: scene presentation-- Enjoy a bar in 2012 --AmI
space of the bar
Electronic devices at
both entrances
Personal electronic devices
Adaptive screen
TV screen
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 8 / 14
Schematic view of the scenario-- Enjoy a bar in 2012 --
Entry intothe bar At the bar
Chanceencounter
Payment
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 9 / 14
Use case 1: in his/her city Entry into
the bar At the barChance
encounterPayment
He declares his
preferences and actives his availability to meet a friend
Barman: do you want a cappuccino? (the favourite drink) The adaptive screen shows him the soft
drinks.Thanks to his
electronic devices he watches TV in
the language of his choice (preference)
An alarm notifies him a friend is coming in.
He pays with fingerprint
mode
He pays with RFID card from local account.
- favourite drink, etc.- user specificities: temporal medication - list of friends based of phone numbers
- Seamless (T)- Standard (T)- Level of personal control (S)- Use in a natural way (S) - Protection of data (L)- Trust and market (E)
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 10 / 14
Use case 2: foreign countries
Entry intothe bar At the bar
Chanceencounter
Payment
He declares his
preferences.A temporal account is
open.
The adaptive screen automatically
provides him the menu in his own
language.
After a drink and a reservation of this
hotel through the wifi connection, he is more relaxed and
actives his availability to meet a person
putting his profile at disposal.
An alarm notifies him
two answers.He accepts
one.
His temporal account
indicates the amount to be paid in both currencies with the
conversion rate.
- Seamless (T)- Standard (T)- Level of personal control (S)- Use in a natural way (S) - Protection of data (L)- Trust and market (E)
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 11 / 14
Conclusion: analyse (1/3)
AmI characteristicsAdaptive
Language, currency, soft drinks (medication taken into account)
Easy to useBiometrics
InteroperabilityForeign countries
Seamless Wifi, RFID
User-driven approachTake into account profile, user preferences
Identity in the AmI environment
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 12 / 14
Conclusion: analyse (2/3) Identity types
Offline identityRelated to the appearance, finger (uc1)Identity tokens, RFID card (uc1), credit card(uc2), BAN (uc1)
Digital identityRelated to the appearance, fingerprint template(uc1)Social information, ID of personal electronic device(uc1&2)
Identity to bridge offline and digital IdentitiesKnowledge-based Identification, [password, PIN of personal electronic device(uc1&2)]Related to the user context, profile, use preferences (uc1&2)
Identity concernsPrivacy and control
User decides to active or not his availability, what information is put at disposal, and knows (trusts) the scope of disclosure is inside the AmI bar
Data protection
Identity in the AmI environment
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 13 / 14
Identity in the AmI environment Entry into
the bar At the barChance
encounterPayment
He declares his
preferences and actives his availability to meet a friend
Barman: do you want a cappuccino? (the favourite drink) The adaptive screen shows him the soft
drinks.Thanks to his
electronic devices he watches TV in
the language of his choice (preference)
An alarm notifies him a friend is coming in.
He pays with fingerprint
mode
He pays with RFID card from local account.
1 Profile representation individual profile preferences
2 Profile representation individual profile sociological profile personal network
1 Identifier biometrics fingerprint
2 identifier electronic device id card / RFID
1 Identifier electronic device ( PDA)
2 Profile representation individual profile preferences
Identity / electronic device / access
1 Identity / data protection
2 Identity / storage / biometrics template
Conclusion: analyse (3/3)
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 14 / 14
Sabine Delaitre
JRC, IPTS, ICT unit
http://cybersecurity.jrc.es
Thank you
FIDIS 2nd WS WP2 – Fontainebleau, December 2004 15 / 14
Use case 2: foreign countries Entry into
the bar At the barChance
encounterPayment
He declares his
preferences.A temporal account is
open.
The adaptive screen automatically
provides him the menu in his own
language.
After a drink and a reservation of this
hotel through the wifi connection, he is more relaxed and
actives his availability to meet a person
putting his profile at disposal.
An alarm notifies him
two answers.He accepts
one.
His temporal account
indicates the amount to be paid in both currencies with the
conversion rate.
Analyse (4)
Profile representation individual profile sociological profile /anonymous
Profile representation individual profile preferences
1 Identity / electronic device / access
2 Identity / standardization