Senior Executive Advisor for Identity Management
National Institute of Standards and Technology
A blue simplified human figure sits in a chair typing on a laptop computer.
Voiceover: When you use the Internet, sometimes you want to be anonymous.
The words “signed unhappy customer” appear on the screen.
Voiceover: But sometimes you want to be sure that you and only you can access sensitive information or provide it to others.
Four simplified structures appear across from the figure representing a health care provider, a pharmacy, a bank, and the World Wide Web. Arrows with the words, passwords, 1, 2, 3, and 4 stream from the figure to the structures.
Voiceover: You might have lots of passwords, too many to remember them all. Or maybe you use the same password many times. Either way, ID thieves can guess or steal your passwords and pretend to be you.
New arrows appear that say only “password.”
The scene zooms closer to show just a bank, a red simplified figure and the blue figure typing on a laptop. An arrow moves from the blue figure to a simplified bank with the word password appearing above it. Another arrow shows the password traveling to the red figure. Dollar bills are shown flowing from the bank to the red figure.
Voiceover: A group of private and public organizations thinks there’s a better way. They are building a voluntary system—an identity ecosystem—where consumers and businesses can more confidently conduct transactions online.
First the initials, NSTIC, and then the words, National Strategy for Trusted Identities in Cyberspace appear and then rotate in space.
Voiceover: If you decide to participate, you would pick one or more private or public secure ID providers and prove your identity.
Three simplified structures labeled “Identity Providers” appear across from a standing blue figure. Each structure has a different type of lock on its façade.
Two of the structures disappear. Arrows flow from the figure to the identity providers with the words, date of birth, home address, mother’s maiden name.
Voiceover: The company or public agency would issue you a trusted credential. It might be a secure application on your cell phone, a smart card, or another device.
An arrow flows from the identity provider with the words “identity confirmed.” A rotating 3-D green polygon appears from the ID provider and moves toward the figure. The scene zooms in on the polygon. A smart card shaped like a credit card, a smart phone, and a random digit key fob swirl around the polygon.
Voiceover: Your credential proves you are you. Most online providers no longer need your personal information.
The scene changes to show a bank on the left, the blue figure and the rotating polygon in the center, and an ID provider on the right. An arrow flows from the figure to the bank that says “log in” from the bank to the polygon that says “Valid credential?” from the polygon to the ID provider that says “?.” A second set of arrows flows from the ID provider back to the polygon that show a thumbs up sign, from the polygon to bank that says “authenticated” and finally from the bank to the figure that says, “Welcome.”
Voiceover: You could use your trusted ID for sensitive transactions and not use it for others, like surfing the Web.
The seated blue figure types on a laptop. Two-way arrows show data flow between the credential and a health care provider, a pharamacy, and a bank. Two-way arrows show data from an ID provider to the credential. The original arrows disappear and a two-way arrow appears between the World Wide Web and the figure directly.
Voiceover: Your ID provider would not know how you use your credential.
The health care provider, pharmacy, and bank become gray boxes communicating with the credential while the ID provider also communicates with the credential.
Voiceover: There is no central database tracking your actions.
The arrows between the various items in the scene disappear.
Voiceover: In the new cyber world with trusted IDs, online transactions are safer and more convenient. You control access to your personal information.
The scene shifts to the ID provider on the left, the rotating green credential in the center, and the seated blue figure typing on a laptop.
Animation: Trent Schindler
Narration: Emilie de Azevedo
Video Editing: Leon Gerskovic
Produced by: NIST Public Affairs Office, March 2011