Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    A Smarter Identity

    Written by

    Brian Livingston
    Published March 1, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Viruses. Worms. Spam. Identity theft. What do all these things have in common (besides the fact that you hate them)? The people behind these crimes dont want to be discovered. Indeed, they remain at large because the Internet allows perpetrators to spew out malware incognito. Unchecked, the rapid rise of assaults like these will grow to overwhelm us.

      Ive listened to too many IT professionals, some of them in Redmond, Wash., who remain blasé about these problems. “We have spam filters and anti-virus signatures,” they say. “Its a manageable situation.”

      This is the response of a computer profession in denial. Everyone who reads a newspaper learned long ago that 15-year-olds can game the Internet and that the brightest minds in IT cant find the perps, much less stop them. Sure, we must try to manage the threats. But the failure of the computing industry to halt this nonsense is a black eye for us all.

      Now, finally, we can say, “Enough!” Technology has advanced to the point that every Internet user could carry a small, inexpensive device that positively identifies him or her. Users ability to easily prove who they are could restore the integrity of e-mail, e-commerce and a wide variety of other activities.

      This device could be called numerous things, but I call it a USB Key. Tiny USB pen drives can now readily support true challenge/response authentication. A mere password or digitized fingerprint can be intercepted and used to impersonate you. But two-factor authentication, using a USB Key and a PIN, for instance, is very hard to fake.

      Theres nothing magical about USB. The same verification role can be played by smart cards, such as the American Express Blue card and others. But there are a lot more USB ports than smart-card readers in offices and homes worldwide, so Im betting USB wins out.

      For people to adopt such devices, we need two things: (1) a simple way to distribute the keys and (2) programs that recognize and reward their use.

      The U.S. Postal Service can provide the first element with its In-Person Proofing project. The Postal Service has talked about this since at least 2001, but its now ready to roll. The process involves showing up in person at a post office, much like applying for a passport. After your identity is verified, you are eligible to download digital credentials. These are stored in your USB Key, smart card or other device, ready to use.

      Chuck Chamberlain, the Postal Service program manager for new products, said the system is close to being adopted by two states and a few federal agencies. Thats a solid start. Outside the United States, members of the 189-nation Universal Postal Union are already moving in the same direction.

      I dont believe privacy issues will sink this. Practically every country issues drivers licenses and passports. We dont hesitate to show them when needed. Issuing ID in digital form is just a variation on this basic government service.

      Im aware that digital certificates have been available for years. I use them myself on my Web sites that offer e-commerce functionality. But the technology has not achieved mass appeal.

      “Whoever designed digital certificates apparently didnt do any usability testing,” said Neal Creighton, CEO of GeoTrust, which sells digital certificates and USB devices.

      The second element we need is incentives that make USB Keys valuable and desirable. Perhaps youll get a lower tax rate when filing electronically with the IRS. Or a higher feedback score at eBay. The possibilities are endless.

      Would proven identity solve all Internet problems? Of course not. But it would be better than just letting unnamed wackos continue to hammer us.

      Into the Unknown

      This is the last column in my Known Issues series for eWEEK. Ill be devoting my time to writing my next book, titled “Windows 2006 Secrets” (or whatever Microsoft decides to call its “Longhorn” operating system). Until then, get the latest tips by signing up for my free newsletter at www.BriansBuzz.com.

      Brian Livingston is editor of BriansBuzz. com and co-author of “Windows Me Secrets” and nine other books. Send your comments to [email protected].

      Brian Livingston
      Brian Livingston

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.