32
ANONYMITY, IDENTITY, TRUST AN OVERVIEW OF THE UPASS IDENTITY SYSTEM Romek Szczesniak Eleanor McHugh

Anonymity, identity, trust

Embed Size (px)

Citation preview

Page 1: Anonymity, identity, trust

ANONYMITY, IDENTITY, TRUST AN OVERVIEW OF THE UPASS IDENTITY SYSTEM

Romek Szczesniak

Eleanor McHugh

Page 2: Anonymity, identity, trust

Cryptographer Security Architect

Physicist Privacy Architecture

1998 PKIelliptic curvessatellite PSN

1999 π-calculus VM2000 control networks2001 mobile identity

secure documents2003 ENUM2006 dotTel

hybrid encryption2007 encrypted DNS2010 concurrent VM2011 national eID2012 encrypted SQL

privacy by design2014 uPass2017 Identity Lab

Page 3: Anonymity, identity, trust

DIGITAL IDENTITY

like identity only digital

Page 4: Anonymity, identity, trust

TO PROVE YOUR

AGEseeing is believing

Page 5: Anonymity, identity, trust

ID CARD

➤ photo for visual comparison

➤ hologram to assert validity

➤ date of birth reveals age

➤ serial number allows this card to be recorded and tracked

➤ physical security increases cost of counterfeiting

➤ smart card features allow use with digital scanners

➤ not government issued

Page 6: Anonymity, identity, trust

BIOMETRICS

➤ if it can be measured and tends towards uniqueness…

➤ faces

➤ fingerprints

➤ iris patterns

➤ retina patterns

➤ genetic fingerprints

➤ electrocardiogram

➤ electroencephalogram

➤ it can also be counterfeited!

Page 7: Anonymity, identity, trust

LIVENESS

➤ digital data is easily copied

➤ replay attacks repeat a previously captured biometric

➤ spoofing creates a facsimile of a biometric capable of fooling a digital system

➤ proofs

➤ is data being captured now

➤ is it from a genuine source

➤ has it been tampered with

➤ is it likely to be unique

Page 8: Anonymity, identity, trust

ATTRIBUTES

➤ attributes are discrete facts

➤ dark hair

➤ wears black

➤ professional cryptographer

➤ fragments of an identity

➤ an identity may have none

➤ or some may be imprecise

➤ even as a complete set they may not be unique

➤ anonymity is the lack of attributes

Page 9: Anonymity, identity, trust

UK LEGAL IDENTITY

➤ birth certificate and gender recognition certificate are the primary identity documents

➤ with either it's possible to get

➤ national insurance number

➤ NHS medical card

➤ passport

➤ name can be changed with a deed poll or a statutory declaration

➤ none of these documents include biometrics

Page 10: Anonymity, identity, trust

PROOF OF IDENTITY CHECKS

➤ each exchange of identity comes with proof that the exchange occurred

➤ proof engenders trust

➤ we anchor trust in information based on its provenance and its tamper-resistance

➤ we can also capture proof of why the exchange occurred

➤ we can record these proofs for future reference

➤ good bookkeeping is at the heart of all identity schemes

Page 11: Anonymity, identity, trust

BAD BOOKKEEPINGit doesn't matter… right up until it does

Page 12: Anonymity, identity, trust

PRIVACY

➤ digital data is easily duplicated

➤ when this data moves or is stored it generates metadata

➤ metadata is also digital data

➤ processing data or metadata can reveal identity

➤ so a system which respects privacy needs to know as little as possible about

➤ the data it processes

➤ the metadata it produces

Page 13: Anonymity, identity, trust

SIMPLE CRYPTO

the basic tools we use

Page 14: Anonymity, identity, trust

OBSCURITY

➤ HMAC hashes are large numbers computed from a set of data with cryptography

➤ any change to the set of data will result in a different HMAC value being calculated

➤ symmetric encryption allows two parties with the same key to communicate securely

➤ public key encryption keeps the decryption key secret

➤ hybrid encryption allows a symmetric key to be sent as data encrypted with a public key

Page 15: Anonymity, identity, trust

IMMUTABILITY

➤ singly-linked list are a popular tool in computer science

➤ they allow several lists to share common head segments

➤ a hash chain extends this concept with computed hashes for each node and an optional signature to validate them

➤ alter one item in the chain and all subsequent hashes must be recalculated

Page 16: Anonymity, identity, trust

INTEGRITY

➤ trees are similar to lists but used to speed searches

➤ Merkle trees are trees built from hash chains

➤ Bitcoin uses a list of Merkle trees (the Blockchain) to provide nonrepudiation

➤ building many overlapping trees ensures that changes to one tree invalidate other trees

Page 17: Anonymity, identity, trust

UPASSan opinionated design

Page 18: Anonymity, identity, trust

PRINCIPLES

➤ embodies UK common law understanding of identity

➤ supports true anonymity

➤ prevents mass surveillance

➤ reliable source of potentially unreliable information

➤ transactions are fast with minimal need for consensus

➤ can scale to a global system

➤ works on desktop, mobile & IoT platforms

Page 19: Anonymity, identity, trust

OVERVIEW

➤ anchor document

➤ mobile device

➤ validation service

➤ secure store (proprietary)

➤ one-directional flows

➤ applications

➤ US 20160239653

➤ US 20160239657

➤ US 20160239658

Page 20: Anonymity, identity, trust

REGISTRATION

➤ read anchor document

➤ capture selfie

➤ create profiles

➤ anonymous

➤ date of birth

➤ name

➤ nationality

➤ generate encryption keys

➤ record phone address

➤ issue profile credential

Page 21: Anonymity, identity, trust

TRANSACTIONS

➤ a customer presents a profile credential to a merchant

➤ merchant adds their credential

➤ the two credentials are sent to a validation server

➤ the validation server confirms the credentials are known

➤ it invalidates these and sends receipts directly to both transactees

➤ only the server knows delivery addresses & credentials

Page 22: Anonymity, identity, trust

PROFILES

➤ a set of keys and their associated values

➤ has a confidence value based on its provenance and usage

➤ is immutable and links to previous versions of itself

➤ has an associated selfie chain with photos of its subject

➤ anchored to a document or assigned by another profile

Page 23: Anonymity, identity, trust

CONFIDENCE

➤ courts base judgements on credibility of evidence

➤ a profile's associated selfie can be inspected by its recipient at the time the transaction takes place and compared with the presenter's face

➤ a profile's confidence value warns of a potentially untrustworthy source

➤ application US 20160241531

Page 24: Anonymity, identity, trust

RECEIPTS

➤ receipts come in pairs

➤ each receipt has links to the relevant information about the other transactee

➤ these links to the profile presented and any previously assigned by the recipient

➤ they're encrypted with the recipient's published key

➤ and they contain a shared key which is unique to this transaction

Page 25: Anonymity, identity, trust

MASTER RECEIPTS

➤ receipt pairs are recorded opaquely as master receipts in the secure store

➤ a master receipt is encrypted with the transaction key

➤ the transaction key is never recorded in the secure store

➤ master receipts form a chain

➤ the index for this chain is calculated from the credentials used but these are only stored in the receipt pair

Page 26: Anonymity, identity, trust

BIOMETRIC LIVENESS

➤ a biometric must be simple to capture & tamper resistant

➤ pupillary response to a successive bright flashes of light has calculable properties

➤ eye movement hardened with a shared cryptographic secret unique to a particular device

➤ the server sets the parameters randomly and the device must produce expected responses

➤ application US 20170046583

FIG. 5D

time

Pupillary area

Constriction

δt

first pulse applied

second pulse applied

t1 t2

FIG. 4

D

SF_t

SF_(t_n)

FIG. 9

W

FIG. 8

W

W

FIG. 9

W

FIG. 8

W

W

104

120a

120b

120c

δt

time

Pupillary area

y

x

Pupil dilation

Liveness

Eye tracking

Enrolment

FIG. 11

S1102a

S1102b

S1104a

S1104b

S1106

S1108a

S1108b

S1112

S1110a

S1110b

130

Cv Cv’

PD params

ET params

Collect liveness detection data

S1107

1102a

1102b

PD results PD+ET sig

ET results PD+ET sig

PD+ET params+PD and ET server URIs

1101

PD results+ sig+URI

ET results+ sig+URI

Access control

214

Page 27: Anonymity, identity, trust

104

120a

120b

120c

δt

time

Pupillary area

y

x

Pupil dilation

Liveness

Eye tracking

Enrolment

FIG. 11

S1102a

S1102b

S1104a

S1104b

S1106

S1108a

S1108b

S1112

S1110a

S1110b

130

Cv Cv’

PD params

ET params

Collect liveness detection data

S1107

1102a

1102b

PD results PD+ET sig

ET results PD+ET sig

PD+ET params+PD and ET server URIs

1101

PD results+ sig+URI

ET results+ sig+URI

Access control

214

DEVICE LIVENESS

➤ live biometric responses give us unique values

➤ by controlling where and how these are delivered we can prove uniqueness of our current interaction

➤ and as a result we can prove the device is live

➤ as with a uPass transaction we use one-way messaging

➤ application US 20170048244

Page 28: Anonymity, identity, trust

WEB CONNECT+

➤ sometimes we need to perform transactions via an untrusted intermediary

➤ Man-in-the-Middle attacks

➤ by having a remote server use our device as a validator we can perform a transaction and give them access to a secure back channel

➤ now we can monitor & control the connection to our untrusted intermediary

➤ patent US 9,648,496

Page 29: Anonymity, identity, trust

ASSET TRACKING

➤ the building blocks of uPass can provide identity to things as well as people

➤ we can use this fact to create private identity spaces unique to a particular asset class such as event tickets

➤ this can be used to control how the asset changes hands

➤ patent US 9,519,796

➤ application

➤ US 20160350861

➤ US 20170169362

Page 30: Anonymity, identity, trust

BEYOND UPASS

current research

Page 31: Anonymity, identity, trust

IDENTITY LAB

➤ a tool for exploring interactions between digital identities

➤ and for better understanding how identity impacts machines

➤ real-world abstractions based in physical spaces support models of people, buildings, objects and organisations

➤ text-based

➤ scriptable

➤ aiming for a November release

There are two kinds of people in this world: those forced to buy their garments off the peg, and those who can choose made-to-

measure.

The made-to-measure route is far more effective when introducing a modern digital identity system.

Your organisation already has numerous ways to represent identity tailored to its domain knowledge, auditing, customer relationship, access, and capability management needs.

Right now your IT teams address these with legacy systems no one dares to retire and one-size-fits-all enterprise applications with configuration options to match.

Isn’t it time your organisation’s needs take precedence over those of vendors?

At InIdSol we’re passionate about the science of digital identity and place privacy by design at the centre of both commercial practice and research endeavours.

We use proven iterative methods to keep costs and risks low as we explore our clients’ needs, and apply our scientific understanding to find viable tailored solutions.

This flexible approach works equally well with traditional waterfall development and newer agile methodologies.

As a design house our main outputs are system design documents explaining our proposed solutions for a general audience. The most important of these are detailed specifications intended for implementation but we can also provide proofs of concept and mockups.

Our designs are always supported by onsite training to ensure you gain the necessary skills and institutional memory necessary

to maintain a state-of-the-art digital identity infrastructure.

Aside from design we also provide a code auditing service aimed at identifying

weaknesses in your existing applications and providing remedial advice for privacy hardening.

Our many years implementing digital identity systems allows us to work with recruiters to screen potential candidates for suitable experience as you build your developer or support base, focusing on security, biometrics, and machine learning.

As an added bonus we have extensive experience developing patents so where commercial considerations make this a high priority we will introduce you to respected patent attorneys to oversee the process.

the bespoke experience

Page 32: Anonymity, identity, trust

WWW.INIDSOL.UKRomek Szczesniak

Eleanor McHugh