Card Use Can Stem ID Theft, Microsoft Says

Microsoft this week released a white paper on identity theft with the aim of starting a "vendor-neutral" discussion on the use of "information cards" as an Internet security solution.

In its call to arms, "Online Identity Theft: Changing the Game" (PDF), Redmond said it wants to advance its "vision" in conjunction with government entities, law enforcement agencies, industry peers and ordinary consumers.

Information cards are generated by software -- they are not physical cards such as credit or ATM cards. Microsoft's white paper considers them to be "an interoperable, neutral framework" and a cost-effective answer to alleviating identity theft. The cards are "a basic tool to reduce online identity theft and increase confidence in e-commerce and other online services," according to the report.

The appeal for collaboration comes as Microsoft is already well into implementing its Windows CardSpace technology. CardSpace is Microsoft's current information card technology. It's a client application for Windows operating systems that stores digital identities.

Some security and IT pros are giving Redmond kudos for reaching out to the larger community and agree that a streamlined framework for personal identifiable information is needed.

"A vendor-neutral plan is essential. Absolute power corrupts absolutely," said Randy Abrams, director of technical education for ESET.

"This is one area that is critical to the future of commerce as it is currently taking shape," Abrams added. "The critical element to look closely at is if the technology can be implemented without also causing unacceptable incursions on privacy. That will be a difficult balancing act to pull off.

Microsoft bolstered its identity security expertise by acquiring Credentica's U-Prove technology this year. U-Prove is said to allow authentication while preserving anonymity. Microsoft is currently integrating U-Prove into CardSpace and other software.

Many authentication technologies exist, and new business PCs are typically including them, according Steven Sprague, president and CEO of Massachusetts-based security software firm Wave Systems Corp.

More than "250 million PCs now have now been delivered to users with hardware to facilitate strong authentication," Sprague estimated.

"Should [information cards] be where Redmond is focusing its security efforts?" Sprague asked. "I'd say yes, the time is now to begin to address the authentication problem at scale. As Microsoft has stated, it is time to turn it on and get everyone to play."

Sprague sees two components to identity security.

"One can think of it as two key pieces: the differentiation between the trustworthiness of fellow users and the identity provider; and second, the question of whether one is truly associated with the data that is provided, and whether that person is properly authorizing its release."

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.


  • Old Stone Wall Graphic

    Microsoft Addressing 36 Vulnerabilities in December Security Patch Release

    Microsoft on Tuesday delivered its December bundle of security patches, which affect Windows, Internet Explorer, Office, Skype for Business, SQL Server and Visual Studio.

  • Microsoft Nudging Out Classic SharePoint Blogs

    So-called "classic" blogs used by SharePoint Online subscribers are on their way toward "retirement," according to Dec. 4 Microsoft Message Center post.

  • Datacenters in Space: OrbitsEdge Partners with HPE

    A Florida-based startup is partnering with Hewlett Packard Enterprise in a deal that gives new meaning to the "edge" in edge computing.

  • Windows 10 Hyper-V vs. Windows Server Hyper-V: Which Platform for Which Workloads?

    The differences between these two Hyper-V versions are pretty significant, depending on what you plan to use them for. Here's a quick rundown of each platform, from their features to licensing quirks to intended use cases.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.