Identity in the Ambient Intelligence Environment Sabine Delaitre FIDIS 2nd WS WP2 – Fontainebleau, December 2004 1 / 14 Summary Ambient Intelligence (AmI) Environment Identity in AmI Space Scenario Use Cases FIDIS 2nd WS WP2 – Fontainebleau, December 2004 2 / 14 Ambient Intelligence Environment Or how to enrich the quality of everyday life. Key technologies Ubiquitous Computing Ubiquitous Communication Intelligent user friendly Interfaces Purpose Deliver seamless applications and services to citizens User-driven approach Better integration of technology into our environment Understand how people interact with technology Indispensable component: user context Characteristics to be achieved Ubiquity, awareness, transparency, intelligent, sensitive, adaptive and responsive FIDIS 2nd WS WP2 – Fontainebleau, December 2004 3 / 14 Ambient Intelligence Environment Some drivers for scenario development Technologic Social Seamless communications infrastructure Level of personal control over AmI Common standards to permit interoperation Protection of personal data Legal FIDIS 2nd WS WP2 – Fontainebleau, December 2004 Use in a natural way Trusted network Enhancing opportunities (dev. of app. & provision to market) Economic 4 / 14 Identity in AmI Space (1/2) Identity information Offline Identity Related to appearance (hair, eyes colour, glasses) Social information (name, postal address, phone number) Identity tokens (passport, visa, credit card, security social number, bank account number) Digital Identity Related to appearance (biometrics template) Social Information (nickname, e-mail address, IP address) Identity tokens (digital signature, digital certificate) Identity to bridge offline and digital Identities Knowledge-based Identification (password, PIN) Related to the user context (profile, user preferences) FIDIS 2nd WS WP2 – Fontainebleau, December 2004 5 / 14 Identity in AmI Space (2/2) Identity information concerns Interoperability Identity information should be understandable by any device Privacy Identity information should be used by authorized devices User should be able to control /specify which information to disclose and to whom Data protection Storage Centralized or not FIDIS 2nd WS WP2 – Fontainebleau, December 2004 6 / 14 Scenario: scene presentation AmI space of the bar -- Enjoy a bar in 2012 -TV screen Adaptive screen Electronic devices at both entrances Personal electronic devices FIDIS 2nd WS WP2 – Fontainebleau, December 2004 7 / 14 Schematic view of the scenario -- Enjoy a bar in 2012 -- Entry into the bar At the bar FIDIS 2nd WS WP2 – Fontainebleau, December 2004 Chance encounter Payment 8 / 14 Use case 1: in his/her city Entry into the bar At the bar Chance encounter Payment He pays with An alarm He declares his Barman: do you want a fingerprint cappuccino? (the notifies him a preferences mode favourite drink) friend is and actives his The adaptive screen coming in. availability to He pays with shows him the soft meet a friend RFID card from drinks. local account. Thanks to his electronic devices he - Seamless (T) - favourite drink, etc. watches TV in the - Standard (T) - user specificities: language of his choice - Level of personal control (S) temporal medication (preference) - Use in a natural way (S) - list of friends - Protection of data (L) based of phone - Trust and market (E) numbers FIDIS 2nd WS WP2 – Fontainebleau, December 2004 9 / 14 Use case 2: foreign countries Entry into the bar At the bar He declares his The adaptive screen preferences. automatically provides A temporal him the menu in his own account is open. language. After a drink and a reservation of this hotel through the wifi connection, he is more relaxed and actives his availability to meet a person putting his profile at disposal. Chance encounter Payment An alarm notifies him two answers. He accepts one. FIDIS 2nd WS WP2 – Fontainebleau, December 2004 His temporal account indicates the amount to be paid in both currencies with the conversion rate. - Seamless (T) - Standard (T) - Level of personal control (S) - Use in a natural way (S) - Protection of data (L) - Trust and market (E) 10 / 14 Conclusion: analyse (1/3) Identity in the AmI environment AmI characteristics Adaptive Language, currency, soft drinks (medication taken into account) Easy to use Biometrics Interoperability Foreign countries Seamless Wifi, RFID User-driven approach Take into account profile, user preferences FIDIS 2nd WS WP2 – Fontainebleau, December 2004 11 / 14 Conclusion: analyse (2/3) Identity types Offline identity Identity in the AmI environment Related to the appearance, finger (uc1) Identity tokens, RFID card (uc1), credit card(uc2), BAN (uc1) Digital identity Related to the appearance, fingerprint template(uc1) Social information, ID of personal electronic device(uc1&2) Identity to bridge offline and digital Identities Knowledge-based Identification, [password, PIN of personal electronic device(uc1&2)] Related to the user context, profile, use preferences (uc1&2) Identity concerns Privacy and control User decides to active or not his availability, what information is put at disposal, and knows (trusts) the scope of disclosure is inside the AmI bar Data protection FIDIS 2nd WS WP2 – Fontainebleau, December 2004 12 / 14 Conclusion: analyse (3/3) Entry into the bar Identity in the AmI environment At the bar Chance encounter An alarm He declares his Barman: do you want a cappuccino? (the notifies him a preferences favourite drink) friend is and actives his The adaptive screen coming in. availability to shows him the soft meet a friend drinks. Identity / electronic Thanks to his device / access 1 Profile representation electronic devices he 1 Identifier individual profile watches TV in the electronic device preferences language of his choice( PDA) 2 Profile representation (preference) individual profile sociological profile personal network Payment He pays with fingerprint mode He pays with RFID card from local account. 11Identifier Identity / data biometrics protection fingerprint 2 Identity / storage 2 Profile representation 2/ biometrics identifier individual profile electronic device template preferences id card / RFID FIDIS 2nd WS WP2 – Fontainebleau, December 2004 13 / 14 Thank you Sabine Delaitre sabine.delaitre@cec.eu.int JRC, IPTS, ICT unit http://cybersecurity.jrc.es FIDIS 2nd WS WP2 – Fontainebleau, December 2004 14 / 14 Analyse (4) Use case 2: foreign countries Entry into the bar At the bar He declares his The adaptive screen preferences. automatically provides A temporal him the menu in his own account is open. language. Profile representation individual profile preferences Chance encounter An alarm notifies him two answers. He accepts one. After a drink and a 1 Identity / electronic reservation of this device / access hotel through the wifi 2 Identity / connection, he is more relaxed and actives his standardization availability to meet a person putting his Profile representation profile at disposal. individual profile Payment His temporal account indicates the amount to be paid in both currencies with the conversion rate. sociological profile /anonymous FIDIS 2nd WS WP2 – Fontainebleau, December 2004 15 / 14