Identity in the Ambient Intelligence Environment Sabine Delaitre 1 / 14

advertisement
Identity in the
Ambient Intelligence Environment
Sabine Delaitre
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
1 / 14
Summary
 Ambient Intelligence (AmI) Environment
 Identity in AmI Space
 Scenario
 Use Cases
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
2 / 14
Ambient Intelligence Environment
Or how to enrich the quality of everyday life.
 Key technologies
Ubiquitous Computing
Ubiquitous Communication
Intelligent user friendly Interfaces
 Purpose
Deliver seamless applications and services to citizens
 User-driven approach
Better integration of technology into our environment
 Understand how people interact with technology
 Indispensable component: user context
 Characteristics to be achieved
Ubiquity, awareness, transparency, intelligent,
sensitive, adaptive and responsive
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
3 / 14
Ambient Intelligence Environment
Some drivers for scenario development
Technologic
Social
Seamless
communications
infrastructure
Level of
personal control
over AmI
Common standards to
permit interoperation
Protection
of personal
data
Legal
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
Use in a
natural way
Trusted
network
Enhancing opportunities
(dev. of app. & provision to
market)
Economic
4 / 14
Identity in AmI Space (1/2)
 Identity information
Offline Identity
 Related to appearance (hair, eyes colour, glasses)
 Social information (name, postal address, phone number)
 Identity tokens (passport, visa, credit card, security social
number, bank account number)
Digital Identity
 Related to appearance (biometrics template)
 Social Information (nickname, e-mail address, IP address)
 Identity tokens (digital signature, digital certificate)
Identity to bridge offline and digital Identities
 Knowledge-based Identification (password, PIN)
 Related to the user context (profile, user preferences)
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
5 / 14
Identity in AmI Space (2/2)
 Identity information concerns
Interoperability
 Identity information should be understandable by any device
Privacy
 Identity information should be used by authorized devices
 User should be able to control /specify which information to
disclose and to whom
Data protection
Storage
 Centralized or not
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
6 / 14
Scenario: scene presentation
AmI
space of
the bar
-- Enjoy a bar in 2012 -TV screen
Adaptive
screen
Electronic
devices at
both
entrances
Personal
electronic
devices
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
7 / 14
Schematic view of the scenario
-- Enjoy a bar in 2012 --
Entry into
the bar
At the bar
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
Chance
encounter
Payment
8 / 14
Use case 1: in his/her city
Entry into
the bar
At the bar
Chance
encounter
Payment
He pays with
An alarm
He declares his Barman: do you want a
fingerprint
cappuccino? (the
notifies him a
preferences
mode
favourite drink)
friend is
and actives his
The adaptive screen
coming in.
availability to
He pays with
shows him the soft
meet a friend
RFID card from
drinks.
local account.
Thanks to his
electronic devices he
- Seamless (T)
- favourite drink, etc. watches TV in the
- Standard (T)
- user specificities: language of his choice
- Level of personal control (S)
temporal medication
(preference)
- Use in a natural way (S)
- list of friends
- Protection of data (L)
based of phone
- Trust and market (E)
numbers
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
9 / 14
Use case 2: foreign countries
Entry into
the bar
At the bar
He declares his The adaptive screen
preferences. automatically provides
A temporal him the menu in his own
account is open.
language.
After a drink and a
reservation of this
hotel through the wifi
connection, he is more
relaxed and actives his
availability to meet a
person putting his
profile at disposal.
Chance
encounter
Payment
An alarm
notifies him
two answers.
He accepts
one.
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
His temporal
account
indicates the
amount to be
paid in both
currencies with
the conversion
rate.
- Seamless (T)
- Standard (T)
- Level of personal control (S)
- Use in a natural way (S)
- Protection of data (L)
- Trust and market (E)
10 / 14
Conclusion: analyse (1/3)
Identity in the AmI environment
 AmI characteristics
Adaptive
Language, currency, soft drinks (medication taken into account)
Easy to use
Biometrics
Interoperability
Foreign countries
Seamless
Wifi, RFID
User-driven approach
Take into account profile, user preferences
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
11 / 14
Conclusion: analyse (2/3)
 Identity types
Offline identity
Identity in the AmI environment
Related to the appearance, finger (uc1)
Identity tokens, RFID card (uc1), credit card(uc2), BAN (uc1)
Digital identity
Related to the appearance, fingerprint template(uc1)
Social information, ID of personal electronic device(uc1&2)
Identity to bridge offline and digital Identities
Knowledge-based Identification, [password, PIN of personal
electronic device(uc1&2)]
Related to the user context, profile, use preferences (uc1&2)
 Identity concerns
Privacy and control
User decides to active or not his availability, what information is
put at disposal, and knows (trusts) the scope of disclosure is
inside the AmI bar
Data protection
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
12 / 14
Conclusion: analyse (3/3)
Entry into
the bar
Identity in the AmI environment
At the bar
Chance
encounter
An alarm
He declares his Barman: do you want a
cappuccino? (the
notifies him a
preferences
favourite drink)
friend is
and actives his
The adaptive screen
coming in.
availability to
shows him the soft
meet a friend
drinks.
Identity / electronic
Thanks
to
his
device / access
1 Profile representation
electronic devices he
1 Identifier
 individual profile
watches TV in the  electronic device
 preferences
language of his choice( PDA)
2 Profile representation
(preference)
 individual profile
sociological profile
 personal network
Payment
He pays with
fingerprint
mode
He pays with
RFID card from
local account.
11Identifier
Identity / data

biometrics
protection
 fingerprint
2 Identity / storage
2 Profile representation 2/ biometrics
identifier
 individual profile

electronic device
template
 preferences
 id card / RFID
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
13 / 14
Thank you
Sabine Delaitre
sabine.delaitre@cec.eu.int
JRC, IPTS, ICT unit
http://cybersecurity.jrc.es
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
14 / 14
Analyse (4)
Use case 2: foreign countries
Entry into
the bar
At the bar
He declares his The adaptive screen
preferences. automatically provides
A temporal him the menu in his own
account is open.
language.
Profile representation
 individual profile
 preferences
Chance
encounter
An alarm
notifies him
two answers.
He accepts
one.
After a drink and a 1 Identity / electronic
reservation of this
device / access
hotel through the wifi
2 Identity /
connection, he is more
relaxed and actives his standardization
availability to meet a
person putting his Profile representation
profile at disposal.  individual profile
Payment
His temporal
account
indicates the
amount to be
paid in both
currencies with
the conversion
rate.
 sociological profile /anonymous
FIDIS 2nd WS WP2 – Fontainebleau, December 2004
15 / 14
Download