Endpoint

12/3/2018
12:40 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
100%
0%

Microsoft, Mastercard Aim to Change Identity Management

A new partnership wants to improve how people use and manage the virtual identities that govern their lives online.

Microsoft and Mastercard have formed a partnership to change the way people use and manage their digital identities, the duo announced this morning.

Identity management is an old issue in need of new solutions as people rely on the internet to manage every part of their lives. Online identity verification still requires physical or digital proof from a central party: proof of address, driver's license or passport number, for example. The more accounts someone has, the more usernames and passwords they have to remember.

And the burden to users doesn't stop at passwords. The identity verification process is growing in complexity as companies find new ways to ensure the person logging into an account is who they claim to be. Microsoft and Mastercard want to provide a more secure and efficient way of doing that.

Their idea is to create a service designed to let people enter, control, and share their digital identity data with others, on the devices they use every day. A universally recognized digital identity could make it easier and more seamless for people to work with businesses.

This project, which brings together Microsoft's identity technology and Mastercard's digital transaction capabilities, will serve as the foundation for new Mastercard services run on Microsoft Azure, officials explain in a blog post on the news. The two are teaming up with banks, mobile network operators, and government organizations to make the idea reality.

Microsoft has been building on this idea of identity ownership, arguing that everyone should have their own digital identity within which they can privately store personal information. For businesses, this means creating ways to interact with customers, partners, and suppliers while minimizing security risks. Earlier this summer, the company created a new bug bounty program to reward researchers who found vulnerabilities in its identity services.

The potential for this "universal identity" concept crosses industries. In financial services, a single identity could accelerate the process of creating a new account or securing a loan. Shoppers browsing e-commerce sites could benefit from more personalized experiences and faster transactions across payment types, devices, and service providers.

Aside from financial opportunities, a single identity could simplify tax filing, passport applications, support payments like Social Security, and other government processes. Email, social media, entertainment services, and other lifestyle platforms could also be simplified.

Microsoft and Mastercard think their service could solve several challenges in the identity space. For starters, there are more than one billion people who aren't officially recognized, the majority of whom are women, children, and refugees. A digital identity could prove invaluable in helping people obtain health, financial, and social services they may not otherwise access.

"Today's digital identity landscape is patchy, inconsistent and what works in one country often won't work in another," says Ajay Bhalla, president of cyber and intelligence solutions at Mastercard, in a statement. "We have an opportunity to establish a system that puts people first, giving them control of their identity data and where it is used."

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tDi443
50%
50%
tDi443,
User Rank: Strategist
12/10/2018 | 3:18:41 PM
Re: BLOCKCHAIN
https://www.ccn.com/mastercard-applies-for-new-patent-for-anonymous-blockchain-transactions-a-regulated-bitcoin-tumbler/
Jessica Rochelle
50%
50%
Jessica Rochelle,
User Rank: Apprentice
12/10/2018 | 12:16:08 AM
Re: PCI and security
I am very much pleased with the contents you have mentioned. I wanted to thank you for this great article. 
hungthaixa
50%
50%
hungthaixa,
User Rank: Apprentice
12/7/2018 | 11:18:02 PM
Good article
I like this article. Thanks to that I understand a lot
tDi443
100%
0%
tDi443,
User Rank: Strategist
12/7/2018 | 12:55:57 PM
Re: BLOCKCHAIN
It looks like they are going with AI based sevices for this program. I would be extremely leary of the possiblity for massive privacy abuses by these stakeholders. That's even if they can manage to keep it secure from the hands of criminals and state sponserd hackers. My biggest fear is that this technology would ever fall into the hands of any government.  This identity managerment sceme seeks to create a Universal Online Identiy for everone that uses thier products and services. So basically these corporations will OWN our Cyber-DNA. Very Dangerous concept. I would feel much more  comfortable with a blockchain type solution that could at least protect some sort of anonimity and privacy. It would most likely be a much more secure soolution to the problem of identity managment. 
tDi443
100%
0%
tDi443,
User Rank: Strategist
12/7/2018 | 12:20:49 PM
Re: BLOCKCHAIN
I'm just wondering if these companies will be utulizing blockchain technology in this project. Seems to me like it would be a no-brainer. Ah, but what do I know?
Agent Aix les Bains
50%
50%
Agent Aix les Bains,
User Rank: Apprentice
12/7/2018 | 9:45:37 AM
Re: BLOCKCHAIN
What do you mean ?
tDi443
50%
50%
tDi443,
User Rank: Strategist
12/5/2018 | 1:45:03 AM
BLOCKCHAIN
?
ebyjeeby
100%
0%
ebyjeeby,
User Rank: Strategist
12/4/2018 | 2:05:09 PM
Re: PCI and security
Agreed. Wait for Amazon and VISA to unviel a competing product.
jenshadus
100%
0%
jenshadus,
User Rank: Strategist
12/4/2018 | 9:39:46 AM
PCI and security
I wonder how this will affect PCI and how other CC companies will adapt the new technology.  Guess it all depends on royalties and such.  Then there is iPhone versus the google phones to content with.  This looks like it might be an uphill battle.  Unless they get everyone to play the game it doesn't do the end user much good,
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3812
PUBLISHED: 2019-02-19
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
CVE-2019-8933
PUBLISHED: 2019-02-19
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on ...
CVE-2019-7629
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
CVE-2019-8919
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2019-8917
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...