[DG-IDoT] Common identity standard
pmadsen at pingidentity.com
Fri Jul 24 07:07:17 CDT 2015
was Ranjan actually asking about discovery? :-)
On 7/24/15 8:05 AM, Ingo.Friese at telekom.de wrote:
> Hi Ranjan,
> I’m not sure to have one standard way to finding things.
> What we discussed in the group was a kind of “Google combined with p2p
> discovery” for things. This service might be operated by several
> companies/communities etc. like DNS.
> Everything has relationships that describe things (e.g. is owned by
> Ingo, located in Berlin, run by DT, etc.) So you can find a
> communication endpoint for the thing itself.
> The beauty of a mechanisms like this is it works for all kind of
> protocols and all form of identifier.
> On top of finding things we can establish mechanisms, to authenticate,
> to build trust etc.
> Best Ingo
> *From:*Ranjan Jain (ranjain) [mailto:ranjain at cisco.com]
> *Sent:* Donnerstag, 16. Juli 2015 20:39
> *To:* Friese, Ingo; stollman.j at gmail.com
> *Cc:* dg-idot at kantarainitiative.org
> *Subject:* Common identity standard
> Hey y’all,
> Hope everyone is doing well. Just wanted to bounce a question which
> I’m consistently getting asked around Identity, IoT perspective. Is
> there any industry standard in place or in works which can be used as
> a common standard across multiple identities. What I mean by this is
> that humans have SSN as an identity while a thermostat may have serial
> number while a network device may have a Mac ID as their identity. So,
> while individually they all have their own identity standard, when in
> the IoT world, all these entities start interacting with each other,
> how do we translate one identity into another or how will one identity
> interact with another identity in a standards way?
> *Ranjan Jain*
> Information Technology
> ranjain at cisco.com <mailto:ranjain at cisco.com>
> Phone: *+1 408 853 4396*
> Mobile: *+1 408 627 9538*
> *Cisco Systems, Inc.*
> 400 East Tasman Drive
> San Jose
> United States
> Cisco.com <http://www.cisco.com/>
> Think before you print.
> This email may contain confidential and privileged material for the
> sole use of the intended recipient. Any review, use, distribution or
> disclosure by others is strictly prohibited. If you are not the
> intended recipient (or authorized to receive for the recipient),
> please contact the sender by reply email and delete all copies of this
> DG-IDoT mailing list
> DG-IDoT at kantarainitiative.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the DG-IDoT