{"id":675,"date":"2007-02-06T13:04:27","date_gmt":"2007-02-06T21:04:27","guid":{"rendered":"\/?p=675"},"modified":"2007-02-06T13:16:18","modified_gmt":"2007-02-06T21:16:18","slug":"notes-on-bill-gates-identity-keynote","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=675","title":{"rendered":"Notes on Bill Gates&#8217; Identity Keynote"},"content":{"rendered":"<p>Many of you know my colleague <a href=\"http:\/\/research.microsoft.com\/~mbj\/\">Mike Jones<\/a>. He had enough wits about him to take notes on what actually transpired during the keynote earlier today. So I&#39;ll share them with you:<\/p>\n<blockquote><p>The flow of the identity part of the talk went something like this:<\/p>\n<ul style=\"margin-top: 0in\" type=\"disc\">\n<li>Slide: Evolution of Identity: Making the Vision Real (with picture of two cards in hands)<\/li>\n<li>People are used to choosing what credential to use where for what purpose (talking about cards in our wallets)<\/li>\n<li>We use a variety of physical tokens to represent these things<\/li>\n<li>CardSpace creates a vehicle to allow people to have a GUI for credentials that represent their identities or personas in particular situations<\/li>\n<li>Each thing in the physical world conveys a particular set of information and discloses just enough information<\/li>\n<li>CardSpace provides a drag &#038; drop interface for identity<\/li>\n<li>People will have to acclimate to it<\/li>\n<li>People can create their own credentials and others can give you credentials<\/li>\n<li>The system reasons about what the right credential is for you to simplify things for users<\/li>\n<li>WS-* hints about what credentials that are being looked for<\/li>\n<li>CardSpace shows candidates for credentials<\/li>\n<\/ul>\n<p>Then they segued to the OpenID collaboration announcement:<\/p>\n<ul style=\"margin-top: 0in\" type=\"disc\">\n<li>Issues of reputation and trust are foundational on the Internet<\/li>\n<li>Different levels of trust are needed in different contexts, such as blogs and access to enterprise resources<\/li>\n<li>People have been thinking about issues of trust<\/li>\n<li>OpenID 2.0 is doing this in the blog \/ Web 2.0 world, others are coming at this from the enterprise space<\/li>\n<li>We see these approaches as being complementary<\/li>\n<li>&#8220;Today we are announcing that we are supporting OpenID 2.0 and that they\u00e2\u20ac\u2122re extending what they\u00e2\u20ac\u2122ve done to enable the use of strong credentials&#8221;<\/li>\n<li>They&#39;re doing this because they see that it solves problems and attacks that a pure password approach has<\/li>\n<li>We&#39;re excited about this marriage of CardSpace and Web 2.0<\/li>\n<li>This will help eliminate the possibility of man-in-the-middle attacks<\/li>\n<li>CardSpace is built on our work on the WS-* specifications<\/li>\n<li>OpenID will be endorsing the CardSpace marriage later today<\/li>\n<li>We see this as a very smooth continuum with a common GUI metaphor<\/li>\n<\/ul>\n<\/blockquote>\n<p>Numerous enthusiastic comments followed in Mikes rendition&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OpenID 2.0 is doing this in the blog \/ Web 2.0 world, others are coming at this from the enterprise space.  We see these approaches as being complementary<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,8,22,11,4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/675"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=675"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/675\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}