UK government identity initiatives
past, present, future:
policy and technology perspectives
IDnext April 2015
Dr Jerry Fishenden
Chair, UK Government’s Privacy and Consumer Advisory Group (PCAG)
Senior Research Fellow, Bath Spa University
Director, VoeTek Ltd
The European networking and knowledge platform for Digital Identity
2015
1998
“… it is the responsibility of
government to provide an official
‘citizens card’ once it expects people to
use it to access and validate official
transactions – just as it provides other
documents such as passports and
driving licences.”
2 opposing views of identity:
“… if there is a ‘market’ for ‘identity’,
then it can be met by any number of
private means and does not need a
single official mechanism which could
be portrayed by some as the equivalent
of a national identification card.”
Electronic Government: Information Technologies
and the Citizen. February 1998. Parliamentary
Office of Science and Technology (POST).
View 1
“… it is the responsibility of
government to provide an official
‘citizens card’ once it expects people to
use it to access and validate official
transactions – just as it provides other
documents such as passports and
driving licences.”
View 2
“… if there is a ‘market’ for ‘identity’,
then it can be met by any number of
private means and does not need a
single official mechanism which could
be portrayed by some as the equivalent
of a national identification card.”
Identity Cards Act 2006
Repealed in January 2011 by the
Identity Documents Act 2010 (cards
invalidated with no refunds to
purchasers)
1990s – everyone does their own thing
2001+ – hub-based, federated ID model
(digital certs, UserID/password)
2008+ – enhanced with EMV (chip and
PIN) authentication
2011 – Identity Assurance Programme
(IDAP)
2014 – GOV.UK Verify
A LOOK BACK ....
c. March 2004
service service service service service service
transactions authentication
API API
API API API API API API
payments
API
secure
messaging
helpdesk
websites
3rd party
applications
trusted
third
parties
API API API API API
Govt
Gateway UI X.509 digital certs with W3C digsig, SAML & UserID/password
(with EMV implemented 2008)
Dept Dept Dept Dept Dept Dept
Government Gateway
View 2
View 2
2001 onwards -
federated
authentication using
a variety of
credentials, from
UserID/Password to
digital certificates to
(later) EMV (chip and
PIN)
technical standards
Standards
CustomerCustomer
ApplicationsApplications
GatewayGateway
BackendBackend
SystemsSystems
•• XML using XSD schemas and GovTalk headerXML using XSD schemas and GovTalk header
•• 128 bit SSL encryption128 bit SSL encryption
•• HTTPHTTP
•• tScheme digital ID (optional)tScheme digital ID (optional)
InternetInternet
InternetInternet
•• SSLSSL
•• HTTPHTTP
•• HTTPHTTP
•• SSL for authenticationSSL for authentication
•• XML and GovTalkXML and GovTalk
•• HTTPHTTP
•• Reliable messagingReliable messaging
•• tSchemetScheme digital certificatesdigital certificates
•• HTTP and SSL server certificatesHTTP and SSL server certificates
•• XML and GovTalkXML and GovTalk
•• SMTP for email acknowledgementsSMTP for email acknowledgements
•• Reliable messaging using SOAP andReliable messaging using SOAP and BiztalkBiztalk
•• AuthenticationAuthentication
•• Store & forwardStore & forward
•• TransformationTransformation
•• RoutingRouting
ApplicationApplication
•• Any application:Any application:
Dept/Portal/3Dept/Portal/3rdrd
partyparty
•• Any hostAny host
•• Any deviceAny device
GatewayGateway
SystemSystem
TCP/IP
HTTP
HTTP 128 bit SSL (TLS 1.0)
HTML
XML
X.509 digital certificates
W3C XML signing
EMV (chip and PIN)
Liberty ID-FF and Web Services WS-
Federation
SAML 2
SOAP
SMTP
View 2
... MEANWHILE ...
ID Cards 2006 Edition ...
1. Symbol meaning a chip is embedded
in the card
2. ID card number
3. Citizenship. Foreign nationals in the
UK are being given different cards.
4. Place of birth
5. Signature - digitally embedded in the
card
6. Date of card issue and date it
becomes invalid
7. Photo taken to biometric standards
8. Biometric chip holds fingerprint
record
9. Swipe zone. Information which can
be automatically read by computer
View 1
Identity Cards Act
2006. Card +
National Register.
View 1
... the return of 1930’s thinking?
National Registration
Act 1939. Card +
National Register.
ID Cards 1939 Edition
(aside) private sector not a great
model either …
234
your name, bank account
number, sort code number
… (conveniently embossed
for easy skimming)
… your signature,
“security code” and
“automated hacking
magnetic strip”
View 1
View 1
View 1
WHAT’S HAPPENING NOW?
National Audit Office. Identity Assurance Programme. December 2014. http://www.nao.org.uk/wp-
content/uploads/2014/12/Identity-Assurance-Programme1.pdf
http://www.gov.scot/resource/doc/16999/0110002.pdf
https://www.gov.uk/government/consultations/draft-identity-assurance-principles/privacy-and-
consumer-advisory-group-draft-identity-assurance-principles (original draft)
https://ntouk.files.wordpress.com/2014/07/pcag-ida-principles-3-1.pdf (Version 3.1, 17th July 2014)
first - rebuild trust
IDENTITY ASSURANCE PRINCIPLES
PRIVACY AND CONSUMER ADVISORY GROUP (PCAG)
V3.1 17th July 2014
https://ntouk.files.wordpress.com/2014/07/pcag-ida-
principles-3-1.pdf
Verify
standards
• SAML 2.0
• Identity Assurance SAML 2.0 Profile defines
the authentication flow (published publicly)
• HTTP redirect binding
• SOAP back-channel between hub service and
matching service
• Matching Service Adapter (MSA) provided by
IDAP as a black-box service (JSON API)
UK Government identity initiatives since the late 1990s - IDnext 2015
concepts
• the hub is stateless and acts as a privacy barrier
• the hub provides users with IDP discovery and
orchestrates the authentication and matching
process
• a successful authentication provides an assertion
of identity including Matching Data and a
Persistent Identifier (PID)
• matching data = name, address, DOB, gender +
history where available
a market place of suppliers
• multiple third party providers able to assure
specific attributes of identity
• currently:
– Barclays bank
– PayPal
– Royal Mail
– Experian
– Verizon
– Digidentity
– the Post Office
WHAT NEXT?
caveat
• General Election, May 7th ....
Source: Sky News, 06/04/2015
• a 21st century approach to identity
with clear value and incentives for
citizens, businesses and the public
sector
• proof of entitlement and
authorisation to use a service,
without necessarily identifying the
user
– that is, the disclosure of only the
bare minimum of information
necessary for a transaction:
• for example, providing a proof that a
person is over or under a certain age
threshold, without disclosing their actual
date of birth or their age
• a choice of devices that makes sense
not only to government, but also to us
as citizens and to the commercial sector
• the effective management of electronic
credentials throughout the lifecycle
between issuance and revocation, in a
privacy-friendly way
• decentralised governance of identity
infrastructure across the private and
public sectors, without the need or
desire for anyone to sit in the middle
and log and monitor everything we do
in our daily lives
This is what the nightclub bouncer sees ...
Courtesy Dave Birch, Consult Hyperion
http://www.slideshare.net/15Mb/rusi-psychic-id-slides-493294
... this is not new: there is a toxic lag between out-
dated analogue policymaking and modern digital
technology ...
... better approaches have been understood since
at least 2003 ...
Name: Alice Smith
Address: 1234 Crypto, Seattle, WA
Status: gold customer
DOB: 03-25-1976
Reputation: high
Gender: female
minimal disclosure tokens: basics
Name: Alice Smith
Address: 1234 Crypto, Seattle, WA
Status: gold customer
Prove that
you are from
WA and over
21
Name: Alice Smith
Address: 1234 Crypto, Seattle, WA
Status: gold customer
Which adult
from WA is
this?
? ?
minimal disclosure tokens: basics
DOB: 03-25-1976
Reputation: high
Gender: female
Over-21 proof
Name: Alice Smith
Address: 1234 Crypto, Seattle, WA
Status: gold customer
Prove that
you are a
gold
customer
authenticated anonymity
Name: Alice Smith
Address: 1234 Crypto, Seattle, WA
Status: gold customer
Name: Alice Smith
Address: 1234 Crypto, Seattle, WA
Status: gold customer
UserID: Alice S.
City:
UserID: Alice S.
Seattle, WA?
unlinkable data sharing
?
No unwanted linkages
policy implications
• monolithic, analogue-based identity management
models present unacceptable risks to security and
privacy
• we need open standards and protocols for ensuring
interoperable and secure user identity solutions both
online and offline
• users must be able to use context-specific identities
and minimised attributes (including anonymous and
pseudonymous) in online interactions
• users must be able to control and disclose minimal
information (e.g. “I am over 18”, “I am a UK taxpayer”)
at the macro level
• modernise the policymaking
process:
– ensure technological and scientific
evidence is gathered and understood
prior to legislation being brought
forward
• e.g. avoid ‘the Identity Cards Act’ model,
where a single out-dated and weak
technology solution (simple cards)
became damagingly fused with the
objective and policy outcome
• don’t plan based on what you can
see in the rear-view mirror
conclusion
• the public sector should raise the
game for everyone:
– place the citizen, not private or public
sector organisations, at the centre
and in control of their own data
– empower the citizen with additional
safeguards and protections well
beyond those that the current leaky
plastic cards and online logins provide
– act as a catalyst to encourage the
adoption of user-centric, not
organisation-centric, models
– exploit the potential of personal data
stores
• a twenty-first identity framework must
– ensure technology underpins the rule of law,
security, and privacy and other core democratic
freedoms in contributing to trustworthiness, not
undermines it
– honour throughout the entire design (from
protocols to device design) European values such
as privacy, freedom of expression, protection of
minorities, freedom of association, and freedom
of belief
... reading the future
http://www.billbuxton.com/
acknowledgements
• (all opinions, and errors, are my own work ....)
• my thanks to ....
– the Verify team at the Government Digital Service
– Dr Stefan Brands
– Kim Cameron
– Dave Birch, Consult Hyperion
– all the members of the Privacy and Consumer Advisory Group
– Privacy International and Big Brother Watch
• some elements of this presentation draw upon papers and
presentations from around 2000 onwards – some of which are
available via http://www.slideshare.net/jerryfishenden
UK government identity initiatives
past, present, future:
policy and technology perspectives
IDnext April 2015
Dr Jerry Fishenden
Chair, UK Government’s Privacy and Consumer Advisory Group (PCAG)
Senior Research Fellow, Bath Spa University
Director, VoeTek Ltd
The European networking and knowledge platform for Digital Identity
2015

More Related Content

PPTX
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
PPTX
Beyond the Internet: Seamless Global Communication
PDF
Better use of data
PPTX
2007 presentation to the exec board of a high street bank - the workplace of...
PPT
Innovating through public sector information
PDF
London School of Economics, February 2010, Jerry Fishenden
PDF
19 July 2012 - Loc-poi overview v2
PDF
feb 2018 - Sub22 - The impact of new and emerging information and communicati...
What Should The Public Sector Demand Jerry Fishenden 15.05.2009
Beyond the Internet: Seamless Global Communication
Better use of data
2007 presentation to the exec board of a high street bank - the workplace of...
Innovating through public sector information
London School of Economics, February 2010, Jerry Fishenden
19 July 2012 - Loc-poi overview v2
feb 2018 - Sub22 - The impact of new and emerging information and communicati...

What's hot (19)

PPTX
The death of data protection sans obama
PPTX
Internet of things enabling tech - challenges - opportunities (2016)
PDF
March 2013 Australian Centre Liberal Arts
PDF
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
PDF
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
PDF
The future of digital identity initial perspective
PPT
E commerce
PPTX
IAB Online Content Regulation: Trends
PDF
HSD Digital Citizenship Framework
PDF
Future of digital identity initial perspective - final lr
PDF
Basema aljaberi tra
PPTX
Future of identity - growing demand
PDF
2012 OCT knowledge banking
PPTX
National identity schemes - digital identity - national ID - eGovernment
PPTX
Cyber Banking Conference
PDF
eGovernment in Belgium
PPTX
Presentation of ethical and social issues of ict
PDF
Trust Factory Slides (2015)
PPTX
Social Media & Legal Risk
The death of data protection sans obama
Internet of things enabling tech - challenges - opportunities (2016)
March 2013 Australian Centre Liberal Arts
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Feb 2020 - Senate Submission Financial Technology and Regulatory Technology
The future of digital identity initial perspective
E commerce
IAB Online Content Regulation: Trends
HSD Digital Citizenship Framework
Future of digital identity initial perspective - final lr
Basema aljaberi tra
Future of identity - growing demand
2012 OCT knowledge banking
National identity schemes - digital identity - national ID - eGovernment
Cyber Banking Conference
eGovernment in Belgium
Presentation of ethical and social issues of ict
Trust Factory Slides (2015)
Social Media & Legal Risk
Ad

Similar to UK Government identity initiatives since the late 1990s - IDnext 2015 (20)

PPT
digital identity 2.0: how technology is transforming behaviours and raising c...
PDF
Indjic fintech module 3
PDF
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
PDF
Future of digital identity programme summary - 19 mar 2019 lr
PDF
The internet of things..perspectives for the Nigerian legal system
PPTX
The Present and Future of Blockchain and AI by Dinis Guarda
PDF
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
PPTX
From E-Government to Open Government
PDF
The future of digital identity 2019 future agenda
PPTX
20220301 digital person v15
PPT
Smartcard Helsinki Public ID conference
PDF
Accelerating the creation and deployment of e-Government services by ensuring...
PDF
George konstantakis iot and product design
PPTX
IT law : the middle kingdom between east and West
PPTX
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
PDF
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
PDF
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
PDF
Presentation on Technology Integration in Tourist Policing in the Era of 4IR ...
PPTX
Jul 16 isaca london data protection, security and privacy risks - on premis...
PDF
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
digital identity 2.0: how technology is transforming behaviours and raising c...
Indjic fintech module 3
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Future of digital identity programme summary - 19 mar 2019 lr
The internet of things..perspectives for the Nigerian legal system
The Present and Future of Blockchain and AI by Dinis Guarda
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
From E-Government to Open Government
The future of digital identity 2019 future agenda
20220301 digital person v15
Smartcard Helsinki Public ID conference
Accelerating the creation and deployment of e-Government services by ensuring...
George konstantakis iot and product design
IT law : the middle kingdom between east and West
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
PRJ.1578-Omidyar-Network-Digital-Identity-Issue-Analysis-Executive-Summary-v1...
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Presentation on Technology Integration in Tourist Policing in the Era of 4IR ...
Jul 16 isaca london data protection, security and privacy risks - on premis...
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Ad

More from Jerry Fishenden (7)

PDF
2006 — Technology Adoption: emerging technologies and their likely impact
PDF
Reinventing government for the Internet age Jerry Fishenden 2008
PPTX
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
PPT
uk identity assurance programme - IDA draft principles
PPTX
Designing online social security for the future
PDF
Open Forum Summit June 2010
PPTX
The Future Of Creative Technologies Conference Abridged
2006 — Technology Adoption: emerging technologies and their likely impact
Reinventing government for the Internet age Jerry Fishenden 2008
Interactive Palimpsests - IEEE ISCC April 2014 Jerry Fishenden
uk identity assurance programme - IDA draft principles
Designing online social security for the future
Open Forum Summit June 2010
The Future Of Creative Technologies Conference Abridged

Recently uploaded (20)

PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PPTX
Internet of Everything -Basic concepts details
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Human Computer Interaction Miterm Lesson
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Co-training pseudo-labeling for text classification with support vector machi...
Connector Corner: Transform Unstructured Documents with Agentic Automation
giants, standing on the shoulders of - by Daniel Stenberg
Auditboard EB SOX Playbook 2023 edition.
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Module 1 Introduction to Web Programming .pptx
Lung cancer patients survival prediction using outlier detection and optimize...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Internet of Everything -Basic concepts details
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
Microsoft User Copilot Training Slide Deck
Data Virtualization in Action: Scaling APIs and Apps with FME
Human Computer Interaction Miterm Lesson
Electrocardiogram sequences data analytics and classification using unsupervi...
SGT Report The Beast Plan and Cyberphysical Systems of Control
EIS-Webinar-Regulated-Industries-2025-08.pdf

UK Government identity initiatives since the late 1990s - IDnext 2015

  • 1. UK government identity initiatives past, present, future: policy and technology perspectives IDnext April 2015 Dr Jerry Fishenden Chair, UK Government’s Privacy and Consumer Advisory Group (PCAG) Senior Research Fellow, Bath Spa University Director, VoeTek Ltd The European networking and knowledge platform for Digital Identity 2015
  • 2. 1998 “… it is the responsibility of government to provide an official ‘citizens card’ once it expects people to use it to access and validate official transactions – just as it provides other documents such as passports and driving licences.” 2 opposing views of identity: “… if there is a ‘market’ for ‘identity’, then it can be met by any number of private means and does not need a single official mechanism which could be portrayed by some as the equivalent of a national identification card.” Electronic Government: Information Technologies and the Citizen. February 1998. Parliamentary Office of Science and Technology (POST).
  • 3. View 1 “… it is the responsibility of government to provide an official ‘citizens card’ once it expects people to use it to access and validate official transactions – just as it provides other documents such as passports and driving licences.” View 2 “… if there is a ‘market’ for ‘identity’, then it can be met by any number of private means and does not need a single official mechanism which could be portrayed by some as the equivalent of a national identification card.” Identity Cards Act 2006 Repealed in January 2011 by the Identity Documents Act 2010 (cards invalidated with no refunds to purchasers) 1990s – everyone does their own thing 2001+ – hub-based, federated ID model (digital certs, UserID/password) 2008+ – enhanced with EMV (chip and PIN) authentication 2011 – Identity Assurance Programme (IDAP) 2014 – GOV.UK Verify
  • 4. A LOOK BACK ....
  • 5. c. March 2004 service service service service service service transactions authentication API API API API API API API API payments API secure messaging helpdesk websites 3rd party applications trusted third parties API API API API API Govt Gateway UI X.509 digital certs with W3C digsig, SAML & UserID/password (with EMV implemented 2008) Dept Dept Dept Dept Dept Dept Government Gateway View 2
  • 6. View 2 2001 onwards - federated authentication using a variety of credentials, from UserID/Password to digital certificates to (later) EMV (chip and PIN)
  • 7. technical standards Standards CustomerCustomer ApplicationsApplications GatewayGateway BackendBackend SystemsSystems •• XML using XSD schemas and GovTalk headerXML using XSD schemas and GovTalk header •• 128 bit SSL encryption128 bit SSL encryption •• HTTPHTTP •• tScheme digital ID (optional)tScheme digital ID (optional) InternetInternet InternetInternet •• SSLSSL •• HTTPHTTP •• HTTPHTTP •• SSL for authenticationSSL for authentication •• XML and GovTalkXML and GovTalk •• HTTPHTTP •• Reliable messagingReliable messaging •• tSchemetScheme digital certificatesdigital certificates •• HTTP and SSL server certificatesHTTP and SSL server certificates •• XML and GovTalkXML and GovTalk •• SMTP for email acknowledgementsSMTP for email acknowledgements •• Reliable messaging using SOAP andReliable messaging using SOAP and BiztalkBiztalk •• AuthenticationAuthentication •• Store & forwardStore & forward •• TransformationTransformation •• RoutingRouting ApplicationApplication •• Any application:Any application: Dept/Portal/3Dept/Portal/3rdrd partyparty •• Any hostAny host •• Any deviceAny device GatewayGateway SystemSystem TCP/IP HTTP HTTP 128 bit SSL (TLS 1.0) HTML XML X.509 digital certificates W3C XML signing EMV (chip and PIN) Liberty ID-FF and Web Services WS- Federation SAML 2 SOAP SMTP View 2
  • 9. ID Cards 2006 Edition ... 1. Symbol meaning a chip is embedded in the card 2. ID card number 3. Citizenship. Foreign nationals in the UK are being given different cards. 4. Place of birth 5. Signature - digitally embedded in the card 6. Date of card issue and date it becomes invalid 7. Photo taken to biometric standards 8. Biometric chip holds fingerprint record 9. Swipe zone. Information which can be automatically read by computer View 1 Identity Cards Act 2006. Card + National Register.
  • 10. View 1 ... the return of 1930’s thinking? National Registration Act 1939. Card + National Register. ID Cards 1939 Edition
  • 11. (aside) private sector not a great model either … 234 your name, bank account number, sort code number … (conveniently embossed for easy skimming) … your signature, “security code” and “automated hacking magnetic strip” View 1
  • 15. National Audit Office. Identity Assurance Programme. December 2014. http://www.nao.org.uk/wp- content/uploads/2014/12/Identity-Assurance-Programme1.pdf
  • 17. IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17th July 2014 https://ntouk.files.wordpress.com/2014/07/pcag-ida- principles-3-1.pdf
  • 19. standards • SAML 2.0 • Identity Assurance SAML 2.0 Profile defines the authentication flow (published publicly) • HTTP redirect binding • SOAP back-channel between hub service and matching service • Matching Service Adapter (MSA) provided by IDAP as a black-box service (JSON API)
  • 21. concepts • the hub is stateless and acts as a privacy barrier • the hub provides users with IDP discovery and orchestrates the authentication and matching process • a successful authentication provides an assertion of identity including Matching Data and a Persistent Identifier (PID) • matching data = name, address, DOB, gender + history where available
  • 22. a market place of suppliers • multiple third party providers able to assure specific attributes of identity • currently: – Barclays bank – PayPal – Royal Mail – Experian – Verizon – Digidentity – the Post Office
  • 24. caveat • General Election, May 7th .... Source: Sky News, 06/04/2015
  • 25. • a 21st century approach to identity with clear value and incentives for citizens, businesses and the public sector • proof of entitlement and authorisation to use a service, without necessarily identifying the user – that is, the disclosure of only the bare minimum of information necessary for a transaction: • for example, providing a proof that a person is over or under a certain age threshold, without disclosing their actual date of birth or their age
  • 26. • a choice of devices that makes sense not only to government, but also to us as citizens and to the commercial sector • the effective management of electronic credentials throughout the lifecycle between issuance and revocation, in a privacy-friendly way • decentralised governance of identity infrastructure across the private and public sectors, without the need or desire for anyone to sit in the middle and log and monitor everything we do in our daily lives
  • 27. This is what the nightclub bouncer sees ...
  • 28. Courtesy Dave Birch, Consult Hyperion http://www.slideshare.net/15Mb/rusi-psychic-id-slides-493294
  • 29. ... this is not new: there is a toxic lag between out- dated analogue policymaking and modern digital technology ... ... better approaches have been understood since at least 2003 ...
  • 30. Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer DOB: 03-25-1976 Reputation: high Gender: female minimal disclosure tokens: basics Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer
  • 31. Prove that you are from WA and over 21 Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer Which adult from WA is this? ? ? minimal disclosure tokens: basics DOB: 03-25-1976 Reputation: high Gender: female Over-21 proof
  • 32. Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer Prove that you are a gold customer authenticated anonymity
  • 33. Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer Name: Alice Smith Address: 1234 Crypto, Seattle, WA Status: gold customer UserID: Alice S. City: UserID: Alice S. Seattle, WA? unlinkable data sharing ? No unwanted linkages
  • 34. policy implications • monolithic, analogue-based identity management models present unacceptable risks to security and privacy • we need open standards and protocols for ensuring interoperable and secure user identity solutions both online and offline • users must be able to use context-specific identities and minimised attributes (including anonymous and pseudonymous) in online interactions • users must be able to control and disclose minimal information (e.g. “I am over 18”, “I am a UK taxpayer”)
  • 35. at the macro level • modernise the policymaking process: – ensure technological and scientific evidence is gathered and understood prior to legislation being brought forward • e.g. avoid ‘the Identity Cards Act’ model, where a single out-dated and weak technology solution (simple cards) became damagingly fused with the objective and policy outcome • don’t plan based on what you can see in the rear-view mirror
  • 36. conclusion • the public sector should raise the game for everyone: – place the citizen, not private or public sector organisations, at the centre and in control of their own data – empower the citizen with additional safeguards and protections well beyond those that the current leaky plastic cards and online logins provide – act as a catalyst to encourage the adoption of user-centric, not organisation-centric, models – exploit the potential of personal data stores
  • 37. • a twenty-first identity framework must – ensure technology underpins the rule of law, security, and privacy and other core democratic freedoms in contributing to trustworthiness, not undermines it – honour throughout the entire design (from protocols to device design) European values such as privacy, freedom of expression, protection of minorities, freedom of association, and freedom of belief
  • 38. ... reading the future http://www.billbuxton.com/
  • 39. acknowledgements • (all opinions, and errors, are my own work ....) • my thanks to .... – the Verify team at the Government Digital Service – Dr Stefan Brands – Kim Cameron – Dave Birch, Consult Hyperion – all the members of the Privacy and Consumer Advisory Group – Privacy International and Big Brother Watch • some elements of this presentation draw upon papers and presentations from around 2000 onwards – some of which are available via http://www.slideshare.net/jerryfishenden
  • 40. UK government identity initiatives past, present, future: policy and technology perspectives IDnext April 2015 Dr Jerry Fishenden Chair, UK Government’s Privacy and Consumer Advisory Group (PCAG) Senior Research Fellow, Bath Spa University Director, VoeTek Ltd The European networking and knowledge platform for Digital Identity 2015