SlideShare a Scribd company logo
1 of 15
User-Centric Identity Eugene Eric Kim <eekim@blueoxen.com> Internet Identity Workshop Mountain View, CA May 1, 2006
Eugene Eric Kim
 
 
 
Your Digital Identity ,[object Object]
Your Digital Reputation ,[object Object]
 
 
What if we controlled our own digital identities?
 
 
 
What are the social and technical implications of user-centric identity?
The Community ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...wegdam
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)wegdam
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015Gigya
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identitywegdam
 
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...Kaliya "Identity Woman" Young
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 

Viewers also liked (7)

Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identity
 
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
User Centric Digital Identity, Talk for Computer Science and Telecommunicatio...
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 

More from Eugene Kim

The "Secret" to High-Performance Collaboration Is Practice
The "Secret" to High-Performance Collaboration Is PracticeThe "Secret" to High-Performance Collaboration Is Practice
The "Secret" to High-Performance Collaboration Is PracticeEugene Kim
 
How to Fail Successfully
How to Fail SuccessfullyHow to Fail Successfully
How to Fail SuccessfullyEugene Kim
 
Changemaker Survey: Obstacles and Help
Changemaker Survey: Obstacles and HelpChangemaker Survey: Obstacles and Help
Changemaker Survey: Obstacles and HelpEugene Kim
 
The Closeted Optimist's Guide to Change
The Closeted Optimist's Guide to ChangeThe Closeted Optimist's Guide to Change
The Closeted Optimist's Guide to ChangeEugene Kim
 
Alliance for Arts Learning Leadership 10-Year Visioning Process
Alliance for Arts Learning Leadership 10-Year Visioning ProcessAlliance for Arts Learning Leadership 10-Year Visioning Process
Alliance for Arts Learning Leadership 10-Year Visioning ProcessEugene Kim
 
Strategic Planning for Networks (Network Funders Meeting)
Strategic Planning for Networks (Network Funders Meeting)Strategic Planning for Networks (Network Funders Meeting)
Strategic Planning for Networks (Network Funders Meeting)Eugene Kim
 
Introducing Groupaya
Introducing GroupayaIntroducing Groupaya
Introducing GroupayaEugene Kim
 
The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...
The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...
The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...Eugene Kim
 
Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...
Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...
Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...Eugene Kim
 
Strategic Planning for Networks
Strategic Planning for NetworksStrategic Planning for Networks
Strategic Planning for NetworksEugene Kim
 
Collaborating Via Artifacts
Collaborating Via ArtifactsCollaborating Via Artifacts
Collaborating Via ArtifactsEugene Kim
 
Networks in an International Context
Networks in an International ContextNetworks in an International Context
Networks in an International ContextEugene Kim
 
What Is Collaboration?
What Is Collaboration?What Is Collaboration?
What Is Collaboration?Eugene Kim
 
Technology As Place
Technology As PlaceTechnology As Place
Technology As PlaceEugene Kim
 
Identity Commons
Identity CommonsIdentity Commons
Identity CommonsEugene Kim
 
(The New) Identity Commons
(The New) Identity Commons(The New) Identity Commons
(The New) Identity CommonsEugene Kim
 
The Augmented Wiki
The Augmented WikiThe Augmented Wiki
The Augmented WikiEugene Kim
 

More from Eugene Kim (17)

The "Secret" to High-Performance Collaboration Is Practice
The "Secret" to High-Performance Collaboration Is PracticeThe "Secret" to High-Performance Collaboration Is Practice
The "Secret" to High-Performance Collaboration Is Practice
 
How to Fail Successfully
How to Fail SuccessfullyHow to Fail Successfully
How to Fail Successfully
 
Changemaker Survey: Obstacles and Help
Changemaker Survey: Obstacles and HelpChangemaker Survey: Obstacles and Help
Changemaker Survey: Obstacles and Help
 
The Closeted Optimist's Guide to Change
The Closeted Optimist's Guide to ChangeThe Closeted Optimist's Guide to Change
The Closeted Optimist's Guide to Change
 
Alliance for Arts Learning Leadership 10-Year Visioning Process
Alliance for Arts Learning Leadership 10-Year Visioning ProcessAlliance for Arts Learning Leadership 10-Year Visioning Process
Alliance for Arts Learning Leadership 10-Year Visioning Process
 
Strategic Planning for Networks (Network Funders Meeting)
Strategic Planning for Networks (Network Funders Meeting)Strategic Planning for Networks (Network Funders Meeting)
Strategic Planning for Networks (Network Funders Meeting)
 
Introducing Groupaya
Introducing GroupayaIntroducing Groupaya
Introducing Groupaya
 
The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...
The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...
The Not-So-Secret Ingredient to Delightful Communities and Powerful Collabora...
 
Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...
Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...
Achieving Collective Intelligence: A Thinker's Guide on Why We Need to Think ...
 
Strategic Planning for Networks
Strategic Planning for NetworksStrategic Planning for Networks
Strategic Planning for Networks
 
Collaborating Via Artifacts
Collaborating Via ArtifactsCollaborating Via Artifacts
Collaborating Via Artifacts
 
Networks in an International Context
Networks in an International ContextNetworks in an International Context
Networks in an International Context
 
What Is Collaboration?
What Is Collaboration?What Is Collaboration?
What Is Collaboration?
 
Technology As Place
Technology As PlaceTechnology As Place
Technology As Place
 
Identity Commons
Identity CommonsIdentity Commons
Identity Commons
 
(The New) Identity Commons
(The New) Identity Commons(The New) Identity Commons
(The New) Identity Commons
 
The Augmented Wiki
The Augmented WikiThe Augmented Wiki
The Augmented Wiki
 

Recently uploaded

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 

Recently uploaded (20)

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 

User-Centric Identity