You are here: Resources > FIDIS Deliverables > HighTechID > D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management > 

D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management

Further Research and Identity Management Considerations  Title:
CONCLUSION
 References

 

Conclusion

The deliverable gave a description of the Trusted Computing technology status and functionalities, and important specifications of the TCG. It also shed the light on the current and future applications and possible scenarios, in addition to the market status and R&D efforts in the field. It also tackled the controversial and legal aspects of TC before giving a perspective on the use of TC for identification and identity management purposes. 

It is clear from the findings that TC has reached an advanced level of detailed specifications, with a fast increasing market and extensive research in the fields. It is also evident that there are many still hidden fields of application for TC, and the analysis given in chapter 8 should raise the awareness to the advantages of TC in the field of identity management, but also in enabling and supporting business cases such as mobile commerce by improving identification and authentication mechanisms. 

While legal consideration should also be coupled with the TC technological advancement, it is of great importance to begin a real assessment of the feasibility of the proposed use cases, and the extent to which TC can bring forward the notion of Digital Identity, and improve identification and identity management systems. 

 

 

 

Further Research and Identity Management Considerations  fidis-wp3-del3.9_Study_on_the_Impact_of_Trusted_Computing_on_Identity_and_Identity_Management_v1.1.sxw  References
36 / 38