Це відео відноситься до openHPI курсу Digitale Identitäten - Wer bin ich im Netz? . Бажаєте побачити більше?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Прокрутити до поточної позиції
- 00:00Let us now start with the question, what is a digital identity and what do we actually need it for?
- 00:08In the virtual world of the many, many services on the Internet, which becomes more and more colourful and richer, more and more services are being offered and are available via the Internet.
- 00:21We can shop online, we can do a whole range of of streaming services,
- 00:26Social media, city guides are available, comparison portals, actually everything is available on the Internet.
- 00:33And many of these services are not just simple, that you're looking at something, but many of these services are interactive.
- 00:41The user can tailor the service to his wishes, he can specify what he is particularly interested in
- 00:48and before you can do something like that, before you can use an interactive service, who then also responds personally to my wishes,
- 00:58you must register with this service, for example at openHPI.
- 01:04If you want to take part in a course, what is going on there can be seen from the outside as well,
- 01:09But if you want to participate interactively, when you want to do exercises, which will be credited to you in the results,
- 01:20The service must know the user, must recognise the user, he needs to know who buys, who downloads music,
- 01:28who is posting something here, who am I assigning it to, how are the purchases paid for, who, with which card, via which bank account?
- 01:37Where must the purchases be delivered to? who can be assigned the quiz results at openHPI
- 01:44So the service must know the user, and for this to work, the user must register before use.
- 01:56This registration process for such a service on the Internet, which means registration.
- 02:03And technically, this application, this registration leads to it, that a digital identity is deposited, that a digital identity is established
- 02:16and the service then this digital identity the activities, which are carried out via this digital identity.
- 02:36But objects also need a digital identity, when they carry out activities on the Internet,
- 02:46so think of the Internet of Things, it is not only people who act, but also objects,
- 02:52and this digital identity, the person or object unambiguously in the digital world.
- 03:02Such a digital identity consists of a number of attributes, a number of features that are necessary to enable the individual user, so that the individual objects can be distinguished from one another.
- 03:18So if you want to distinguish two people, then of course there is the possibility to do this via a combination of name, address, birthday.
- 03:29One attribute, name alone, would not be enough.
- 03:32There are many people with the same name, the service would not be able to distinguish users, but with such an ensemble it is possible.
- 03:41And thus such a ensemble of attributes a digital identity.
- 03:48Which characteristics are important now, which attributes are important now, it depends on the service and it depends on it, in which areas you do something.
- 04:00So sometimes it is enough to just give it a name, sometimes, with people with the same name, you also need the address to differentiate.
- 04:09So that a person X is resident at a certain address, which then leads to the possibility that the service can be used by individual users, individual objects by means of their digital identity.
- 04:27So even one person can be identified under different digital identities register with various services,
- 04:36so can use a different username, can interact with another e-mail address, use another credit card and deposit it with the service for its activities.
- 04:50So it is different from the physical world where there is a physical identity, here in the digital world, we certainly have different identities of the same persons.
- 05:01And this can even be used for different purposes, For example, an anonymous identity without a name, to participate in an online forum with a pseudonym.
- 05:15Or it can be private, a Facebook account, where it is then about hobbies.
- 05:20It can be a professional and business identity, for example at LinkedIn, where it is also important, that you talk about professional matters.
- 05:30That is, the different identities that one and the same person has, can also be used in different ways for different applications.
- 05:42And then you use different attributes in each case, to identify this identity.
- 05:51Now I had already said, not just people, but objects also need a digital identity.
- 05:57For example, a computer, smartphone or network, they need a digital identity to be recognised.
- 06:07So for example in the home network, which of the 5 computers, who are connected there in the net, has which address.
- 06:15Or where to put a file, or web pages, of course, the different websites, also objects,
- 06:25need different identities, which typically via a URL, just to make it clear,
- 06:33where can I find this service, at what address I can use it, I can access websites.
- 06:41Without such a digital identity, these objects could, For example, the websites on the net are not distinguished at all.
- 06:50So not only people need such an identity, but also objects.
- 06:55Now the question is to whom does a digital identity belong, to whom does it belong, how can the person or object in the physical world,
- 07:06how can they prove that they own a particular digital identity, that she has registered with a service under this set of attributes.
- 07:17This is important because, of course, in the end, when, for example, services have to be paid for,
- 07:23then again a physical identity is needed, which then guarantees that this payment will be taken over.
- 07:33So the proof of an identity, that is something that is constantly needed, when we register with a service that it recognises,
- 07:44which user comes here now and then of course immediately knows what this user is allowed to do.
- 07:51This proof of identity, the process consists of two phases, from authentication and authentication.
- 08:04Authentication is that a person first gives proof, that a certain identity belongs to her.
- 08:14If you think of this well-known mechanism with passwords, that's typically what it looks like when you sign up somewhere,
- 08:21then you register the user name or enter the e-mail address, and then you will be asked for a password.
- 08:29The second step in this proof of identity is then on the side of the service, this is the authentication.
- 08:36And that is where the service now has to determine is this link from the user name or in this example of the e-mail and password, this is correct,
- 08:52this means that exactly one user is determined from the user database, so that then after successful authentication all activities which the user carries out, be linked to this account.
- 09:09By the way, for these two phases we have only one term, authentication,
- 09:17and in this respect, i.e. very often, the authentication process is mentioned, but which always consists of these two parts,
- 09:25namely the activity of the user who says "Here, this is really me". and the activity of the service that checks whether what the user is sending to him is actually true.
- 09:39After this authentication is everything, which is now done in the name of this user, connected to his account.
- 09:52So when you make a purchase, the corresponding invoices are incurred and will be sent to the deposited address or debited to the appropriate credit card.
- 10:02So when a stranger succeeds, to feign such a digital identity here,
- 10:09then everything is allowed, what is allowed to the correct user belonging to the identity.
- 10:16So if we sum that up, a digital identity clearly represents a person or an object in the digital world.
- 10:27Digital identities are characterised by a number of attributes, namely name, address, bank details, insurance number, E-mail address, password and others.
- 10:43Persons or objects can - unlike in the physical world - in the digital world, however, do have multiple identities,
- 10:53Identities that may differ in terms of the assigned attributes and can be used for different purposes.
- 11:02The link between a physical and a digital identity, which must of course be produced if payment is then of the goods that are bought there on the net or are about the delivery address.
- 11:16And this connection between physical and digital identity is produced, there are various possibilities,
- 11:27for example, that the user proves that he knows a secret, what was previously deposited during the establishment of the digital identity, for example, to know a password or a PIN or TAN.
- 11:43However, it is also possible to provide evidence with physical characteristics, these are the so-called biometric features.
- 11:50for example fingerprint or iris or face, what is then recognised.
- 11:57Another group of possibilities of this connection between physical and digital identity,
- 12:04that the user or the object proves to be in possession of a specific object, for example a credit card or a smart card,
- 12:14in order to then show and give the service the opportunity in this authentication process,
- 12:25actually, that's the person I'm going to or this is the object to which I now devote all these activities,
Щоб увімкнути запис, виберіть мову в меню налаштувань відео.