Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 70 Next »

This Work Group operates under the Kantara Initiative IPR Policies - Option Creative Commons Attribution-Share Alike


Consumer Identity Work Group News & Updates

Blog stream

Create a blog post to share news and announcements with your team and company.


The purpose of the Consumer Identity WG is to help ensure that emerging Internet-based identity infrastructures are designed and implemented in a way that can help prevent consumer identity theft and other identity-related fraud.  CIWG does this by proposing specific requirements, recommendations, guidelines, and policy positions that foster the implementation and adoption of high assurance identity-related claims (ie, sets of identifiers or other attributes) that can help prevent identity theft and other types of identity-related fraud affecting consumers and service providers.   CIWG also seeks to understand the feasibility issues pertaining to large-scale deployments of these capabilities.

Subject to available resources, CIWG will create reports, whitepapers, and/or other documents that describe how emerging identity technologies, protocols, frameworks, laws and regulations, etc., can be leveraged to: (a) enable a service provider to know, with high assurance, the identities, related attributes, or authorization status of individuals with whom it engages in high-value online transactions, without jeopardizing the privacy interests of those consumers; and (b) enable individual consumers to prevent others from impersonating them in high-value, online transactions.

Read the Work Group charter.

Some Requirements to Support High Assurance Consumer Claims

As a first step towards this goal, the CIWG Interim Report, released in October 2010, addressed the problem of harmful identity theft and other types of identity-related fraud that affects consumers.  The Interim Report highlights several issues that become important when considering how to design and implement an identity infrastructure to support high assurance identity-related claims in a way that consumers will find easy to use, that will maintain their privacy, and that will prevent others from

  • No labels