Skip to main content

Multiple Usernames & Passwords No More: OneID Unveils Its Next-Gen Identity Service


Today, our online identities are fragmented across an array of usernames, email addresses, screen names, social media accounts, passwords, and on and on. We struggle to remember our login info and passwords, so oftentimes we use a few simple passwords that are easy to remember, or find ourselves turning to hints or inboxes to remember our forgotten permutations. Of course, this can cause cracks in our security armor, especially when it comes to online transactions, leaving us vulnerable to online thieves and no-goodniks.
Screen shot 2012-03-13 at 6.40.03 AMEnter: OneID, a San Jose-based startup launching in beta today that is aiming to play a role in the next-generation of digital identity with a service that eliminates the need for multiple usernames and passwords. With OneID, users can securely log in to websites (across platforms), paying online with one single digital identity.
Many have gone after the single sign-on holy grail, but as of yet, all have been rebuffed, because no one wants to hand over all their sensitive personal information to one company.
From the perspective of online businesses, OneID intends to reduce the friction, fraud, and costs associated with authentication and financial transactions, by way of a single login. The goal of which is to improve the experience for the business’ end-user by reducing transaction time. Today, the startup is making its developer release available, which, among other things, allows businesses to take advantage of single sign-on by adding just a few lines of code to their site. (Developers cancheck it out here.)
According to the OneID team, its service is made possible by a combination of asymmetric cryptography, the maturity of mobile hardware/software (and their ubiquity), as well as a distributed architecture that collectively reduces business’ vulnerability to sophisticated online threats by merging the security keys of several personal devices, then encrypted in an amorphous mass in a data center.
In short, it’s an all-out, world-changing infrastructure play, and although it’s got a steep hill to climb, the company will remain one to watch based on its leadership alone. The startup was founded by Steve Kirsch, a wealthy serial entrepreneur, who has founded six companies, including Mouse Systems, Frame Technology, Infoseek, Propel, Abaca, and OneID.
Beyond Infoseek, which Kirsch sold to for a reported $1.7 billion, he is one of the co-inventors of (and holds one of the original patents to) an early version of the optical mouse, which behind Kirsch’s vehicle Mouse Systems, helped bring the optical mouse to IBM PCs.
Along with engineers Jim Fenton, Adam Back, and Bobby Beckman, who co-created the technology behind OneID, Kirsch is going after the big fish: Integrating OneID’s technology into sites across the Web to let users create their own uniform digital identities, using the distributed software to both house payment information and for form-filling requirements.
As such, OneID’s identity software runs in four places — browsers, mobile devices, websites, and the cloud. Again, for businesses, this means reducing the IT costs inherent to authentication and financial transactions, like lost password recovery, chargebacks, liability from credit card theft, the need to store credit card information on their servers, and, thanks to speeding up sign in and check out shopping, reduces cart abandonment.
And for consumers, their credit card and personal information is stored on their personal devices using OneID’s software, which means it won’t be exposed in the event of a central security breach. Users can also choose the level of security they want for each type of transaction, allowing them to balance security with convenience at their discretion.
Of course, many companies have barked up the next-gen secure identity software tree before, to no avail. However, OneID already has several companies lined up to integrate the identity and payment technology, among then Salsa Labs, which offers payment and marketing services for 2,000 nonprofits organizations.
“After evaluating OneID, we see that nonprofits and campaigns of all sizes can benefit from using the service as another way to protect their supporters, donors and members,” said Salsa Labs Co-founder and CEO Chris Lundberg. “The benefits that OneID brings, such as the ease of use for online users and unparalleled security for website owners, was more than enough incentive for us to roll out the service to the Salsa Network.”
For more on OneID, check them out at home here.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત