You are here: Resources > FIDIS Deliverables > HighTechID > D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management > 

D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management

Advantages and Disadvantages  Title:
RECOMMENDATIONS AND FUTURE WORK
 Further Research and Identity Management Considerations

 

Recommendations and Future work

Trusted Computing Benefits for Identity Management

Trusted computing can enhance the notion of digital identification. With TC being able to protect the confidential information associated to a digital identifier due to the tamper-proof nature of the TPM and its key hierarchy, this ensures the confidentiality of this information and hence improves the authenticity and value of the Digital Identity. Identity theft can be significantly reduced.

Anonymity services can be enhanced by deploying a TC infrastructure. The Remote Attestation feature would enable service providers to provide services to any platform that is able to attest a certain secure-known configuration, without having to reveal his identity. This opens a door for a number of new business use cases. 

As for identity management, TC can be used to establish trust between different identity domain, allowing one credential providers in on domain to issue authentication credentials in another domain. This would enhance identity management in terms of interoperability. 

 

Advantages and Disadvantages  fidis-wp3-del3.9_Study_on_the_Impact_of_Trusted_Computing_on_Identity_and_Identity_Management_v1.1.sxw  Further Research and Identity Management Considerations
34 / 38