Tuesday, December 31, 2019

UNICODE

<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
>

<channel>
<title>OpenID</title>
<atom:link href="https://openid.net/feed/" rel="self" type="application/rss+xml" />
<link>https://openid.net</link>
<description>The Internet Identity Layer</description>
<lastBuildDate>Sat, 28 Dec 2019 12:05:11 +0000</lastBuildDate>
<language>en-US</language>
<sy:updatePeriod>
hourly </sy:updatePeriod>
<sy:updateFrequency>
1 </sy:updateFrequency>
<generator>https://wordpress.org/?v=5.2.5</generator>
<atom:link rel='hub' href='https://openid.net/?pushpress=hub'/>
<item>
<title>OpenID Connect for Identity Assurance now has a dedicated home</title>
<link>https://openid.net/2019/12/28/openid-connect-for-identity-assurance-now-has-a-dedicated-home/</link>
<pubDate>Sat, 28 Dec 2019 12:05:11 +0000</pubDate>
<dc:creator><![CDATA[Torsten Lodderstedt]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[eKYC]]></category>
<category><![CDATA[Identity Assurance]]></category>

<guid isPermaLink="false">http://openid.net/?p=35072</guid>
<description><![CDATA[The OpenID Foundation has started the new eKYC and Identity Assurance Working Group, which will develop OpenID specifications for providing Relying Parties with identity information, i.e. Verified Claims, along with an explicit attestation of the verification status of those Claims (what, how, when, according to what rules, using what evidence).  “eKYC” is an industry acronym [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation has started the new eKYC and Identity Assurance Working Group, which will develop OpenID specifications for providing Relying Parties with identity information, i.e. Verified Claims, along with an explicit attestation of the verification status of those Claims (what, how, when, according to what rules, using what evidence).  “eKYC” is an industry acronym for “electronic Know Your Customer”.  The starting point will be the recently approved <a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0.html">OpenID Connect for Identity Assurance</a> draft that was developed by the OpenID Connect Working Group.</p>
<p>More information about the working group can be found at <a href="https://openid.net/wg/ekyc-ida/">https://openid.net/wg/ekyc-ida/</a>.  This page includes information on joining the working group and its mailing list.  The first official call of the new eKYC and Identity Assurance working group will take place on the 8th of January 2020 at 4pm (CET).</p>
]]></content:encoded>
</item>
<item>
<title>Notice of Vote for Second Implementer’s Draft of OpenID Connect Federation Specification</title>
<link>https://openid.net/2019/12/13/notice-of-vote-for-second-implementers-draft-of-openid-connect-federation-specification/</link>
<pubDate>Sat, 14 Dec 2019 03:42:50 +0000</pubDate>
<dc:creator><![CDATA[Mike Jones]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[federation]]></category>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[Public Review]]></category>
<category><![CDATA[specification]]></category>
<category><![CDATA[vote]]></category>

<guid isPermaLink="false">http://openid.net/?p=34972</guid>
<description><![CDATA[The official voting period will be between Monday, December 16, 2019 and Tuesday, January 7, 2020, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, December 16, 2019 for members who have completed their reviews by then, with the voting period ending on Tuesday, January [...]]]></description>
<content:encoded><![CDATA[<p>The official voting period will be between Monday, December 16, 2019 and Tuesday, January 7, 2020, following the <a href="https://openid.net/2019/11/07/second-public-review-period-for-openid-connect-federation-specification-started/">45 day review</a> of the specification. For the convenience of members, voting will actually open on Monday, December 16, 2019 for members who have completed their reviews by then, with the voting period ending on Tuesday, January 7, 2020, running for extra time because of the holidays.</p>
<p>The OpenID Connect Working Group page is <a href="https://openid.net/wg/connect/">https://openid.net/wg/connect/</a>. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval vote. Information on joining the OpenID Foundation can be found at <a href="https://openid.net/foundation/members/registration">https://openid.net/foundation/members/registration</a>.</p>
<p>The vote will be conducted at <a href="https://openid.net/foundation/members/polls/196">https://openid.net/foundation/members/polls/196</a>.</p>
<p>– Michael B. Jones, OpenID Foundation Secretary</p>
]]></content:encoded>
</item>
<item>
<title>“Plays Well with Others”, the OpenID Foundation Recognized as a Global Top 10 Influencing Organization in Digital Identity</title>
<link>https://openid.net/2019/12/13/plays-well-with-others-the-openid-foundation-recognized-as-a-global-top-10-influencing-organization-in-digital-identity/</link>
<pubDate>Fri, 13 Dec 2019 15:28:22 +0000</pubDate>
<dc:creator><![CDATA[Don Thibeau]]></dc:creator>
<category><![CDATA[Foundation]]></category>
<category><![CDATA[News]]></category>
<category><![CDATA[Dakota Gruener]]></category>
<category><![CDATA[digital identity]]></category>
<category><![CDATA[Emma Lindley]]></category>
<category><![CDATA[Financial Data and Technology Association]]></category>
<category><![CDATA[financial data exchange]]></category>
<category><![CDATA[GÉANT Association]]></category>
<category><![CDATA[goode intelligence]]></category>
<category><![CDATA[GSMA]]></category>
<category><![CDATA[ID2020]]></category>
<category><![CDATA[ID4D]]></category>
<category><![CDATA[liaison agreements]]></category>
<category><![CDATA[liaisons]]></category>
<category><![CDATA[open banking implementation entity]]></category>
<category><![CDATA[pam dingle]]></category>
<category><![CDATA[top 10 influencing organization]]></category>
<category><![CDATA[Vyjayanti Desai]]></category>
<category><![CDATA[women in identity]]></category>

<guid isPermaLink="false">http://openid.net/?p=34969</guid>
<description><![CDATA[The OpenID Foundation has been recognized in the recently published The Digital Identity Report – The Global Opportunity for Verified Citizen &#38; Consumer ID, as one of the top 10 global digital identity-influencing organizations that includes the OpenID Foundation. Alan Goode, founder and CEO of Goode Intelligence and author of the report, said “the digital identity [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation has been recognized in the recently published <a href="https://www.goodeintelligence.com/press-releases/goode-intelligence-reveals-top-10-digital-identity-influencing-organisations/"><em>The</em> <em>Digital Identity Report – The Global Opportunity for Verified Citizen &amp; Consumer ID</em></a>, as one of the top 10 global digital identity-influencing organizations that includes the OpenID Foundation.</p>
<p>Alan Goode, founder and CEO of Goode Intelligence and author of the report, said “the digital identity industry is incredibly vibrant with many influencing organisations shaping how digital identity is designed and deployed.  These 10 organisations represent those that we have found to be the most influential throughout our research and we are delighted to announce the names of these highly deserving organisations today.”</p>
<p><em>The</em> <em>Digital Identity Report</em> examines the market for both government and commercial scheme issued digital identities around the world in three digital identity models: Centralised, Federated and Self-Sovereign.  The 230-page report includes a comprehensive review of current global adoption, market analysis including key drivers and barriers for adoption, technology analysis and profiles of companies supplying products and services in this area along with detailed (regional and global) for digital identity (segmented into current important vertical sectors), biometric technology and revenue within the six-year period 2020 to 2025.</p>
<p>Technical standards are only as good as their implementations. The Foundation owes much of its success as a leader in digital identity through a focus on liaison agreements with leading organizations in specific sectors. The work of the Financial Grade API Working Group helps extend a wide variety of implementations of OpenID Connect profiles while also driving some of these liaison relationships. Recent examples of these liaison relationships include our member organizations the GSMA and the UK’s Open Banking Implementation Entity (OBIE) as well as the Financial Data Exchange (FDX), the Financial Data and Technology Association (FDATA) and others.</p>
<p>Liaison agreements are only as good as the concrete value they produce. The OIDF’s Board recently approved substantial investments of human and financial capital in our partnerships in 2020. We’ve donated exhibition space to the Women in Identity at the upcoming Identiverse Conference. We’ve recently approved funding of federation standards development to continue our successful collaboration with Europe’s GÉANT Association. Our close coordination will be demonstrated throughout 2020 in a major conference in Tokyo hosted by the OpenID Foundation Japan, and in the UK in joint workshops with the Open Identity Exchange (OIX),</p>
<p>Collaboration is only as good as the commitment of people. Therefore, on behalf of the OpenID Foundation board of directors, I would like to congratulate our friends and colleagues Vyjayanti Desai of the <a href="https://id4d.worldbank.org/global-dataset">World Bank’s ID4D,</a> Dakota Gruener at <a href="https://id2020.org/">ID2020</a>, Emma Lindley and Pam Dingle, Co-Founders of the <a href="https://womeninidentity.org/">Women in Identity</a> for much deserved recognition in the <em>The</em> <em>Digital Identity Report</em>. We look forward to continuing to work with these organizations and others to help enable digital identities globally.</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>OpenID Summit Tokyo 2020 and Side Events Registrations Are Open</title>
<link>https://openid.net/2019/12/06/openid-summit-tokyo-2020-and-side-events-registrations-are-open/</link>
<pubDate>Fri, 06 Dec 2019 12:29:14 +0000</pubDate>
<dc:creator><![CDATA[Nat Sakimura]]></dc:creator>
<category><![CDATA[Japan]]></category>
<category><![CDATA[Summit Events]]></category>
<category><![CDATA[Technology Events]]></category>
<category><![CDATA[events]]></category>
<category><![CDATA[OpenID Summit]]></category>
<category><![CDATA[Tokyo]]></category>

<guid isPermaLink="false">http://openid.net/?p=34948</guid>
<description><![CDATA[Every four years, OpenID Foundation Japan has an educational meeting called &#8220;OpenID Summit Tokyo&#8221;. The next one is coming up on January 24, 2020. This year it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo. The schedule is as follows: OpenID Summit Tokyo 2020 Jan 24, 2020 @ Shibuya [...]]]></description>
<content:encoded><![CDATA[
<p>Every four years, OpenID Foundation Japan has an educational meeting called &#8220;OpenID Summit Tokyo&#8221;. The next one is coming up on January 24, 2020. This year it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo.</p>

<p>The schedule is as follows:</p>

<h2>OpenID Summit Tokyo 2020</h2>

<p>Jan 24, 2020 @ <a href="http://stream-hall.jp/">Shibuya Stream Hall</a></p>

<figure class="wp-block-image size-large"><img src="http://stream-hall.jp/wordpress/wp-content/uploads/2017/10/shibuya-stream-0014.jpg" alt="" /></figure>

<p><iframe style="border: 0;" src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3241.7908603890687!2d139.70029135035767!3d35.65752403878295!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x60188b5997e18dc9%3A0x4e339e5573667786!2sShibuya%20Stream%20Hall!5e0!3m2!1sen!2sjp!4v1575620452886!5m2!1sen!2sjp" width="600" height="450" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>

<figure class="wp-block-table has-subtle-light-gray-background-color has-background">
<table class="has-fixed-layout">
<tbody>
<tr>
<td><strong>Time </strong></td>
<td><strong>Grand Hall</strong></td>
<td><strong>Breakout Room</strong></td>
</tr>
<tr>
<td>10:00-10:10</td>
<td>Opening Remark Masanori Kusunoki, Chair, OpenID Foundation Japan</td>
<td>&#8212;</td>
</tr>
<tr>
<td>10:10-10:40</td>
<td>Keynote 1 Identity 2020, 2025, and 2030 Ian Glazer, Director, Salesforce</td>
<td>&#8212;</td>
</tr>
<tr>
<td>10:40-11:10</td>
<td>Keynote 2 True Human Identity in the Digital Realm Kim Cameron</td>
<td>Talk to Evangelists</td>
</tr>
<tr>
<td>11:10-11:40</td>
<td>Keynote 3 Enabling large-scale multi-party federations with OpenID Connect Mike Jones</td>
<td>Talk to Evangelists</td>
</tr>
<tr>
<td>11:40-12:30</td>
<td>Break</td>
<td>&#8212;</td>
</tr>
<tr>
<td>12:30-13:00</td>
<td>Open Banking beyond PSD2 in the EU Torsten Lodderstedt Yes</td>
<td>Device Identity as Yet Untold &#8211; Enterprise Security and Device Identity (Kengo Suzuki)</td>
</tr>
<tr>
<td>13:00-13:30</td>
<td>Financial API Updates</td>
<td>WebAuthn using Cloud-assisted BLE (caBLE) (Yoshihiko Nagoya, Lepidum)</td>
</tr>
<tr>
<td>13:30-14:00</td>
<td>Updates on OIDF-J KYC WG Naohiro Fujie, Member of the board, OpenID Foundation Japan</td>
<td>Digital-Keep platform that enables secure rights transactions through the establishment of Digital Identity and eKYC/OIDC (Hiroshi Yamamoto, BitKey)</td>
</tr>
<tr>
<td>14:00-14:30</td>
<td>Updates on the FIDO/eKYC/DID in Korea and the prospects on the future (Bradly Kim, R&amp;D Center/CTO, RaonSecure Co., Ltd.)</td>
<td>Updates on the specs surrounding Native Apps and OpenID Connect (Kazuki Tsuzuki, Yahoo Japan)</td>
</tr>
<tr>
<td>14:30-14:50</td>
<td>Break</td>
<td>&#8212;</td>
</tr>
<tr>
<td>14:50-15:20</td>
<td>Sponsor Session (1): Identity proofing as the key to the second generation IDaaS &#8211; NIST, Supply Chain Security and Orphan ID &#8211; (Jun’ichi Egawa, CEO, Exgen Network Inc.)</td>
<td>Authentication Design Patterns using FIDO (WebAuthN) (Toshiki Matsui, KDDI)</td>
</tr>
<tr>
<td>15:20-15:50</td>
<td>Sponsor Session (2): A deployment case on the unified secure identity management with FIDO and Social Network Identities &#8211; Introduction to a cloud identity platform “SELMID” (Kyoka Hanai, Western Japan Business Development Team, CTC Solutions)</td>
<td>Introduction to OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)&#8211; New User Experience and implementation examples (Takehisa Shibata, Takumi Akaboshi, NRI Secure Technologies)</td>
</tr>
<tr>
<td>15:50-16:20</td>
<td>Updates on the gBizID that utilizes OpenID Connect (Hisafumi Mitsushio, Ministry of Economy, Advisor to CIO, Trade and Industry, Japan)OpenID Connect</td>
<td>Our Identity Experience (Andrew Hindle, Board Member, IDPro; Content Chair, Identiverse)</td>
</tr>
<tr>
<td>16:20-16:50</td>
<td>Research data management space that NII promotes (Kaz Yamaji, Professor, National Insititute of Informatics)</td>
<td>&#8212;</td>
</tr>
<tr>
<td>16:50-17:10</td>
<td>Break</td>
<td>&#8212;</td>
</tr>
<tr>
<td>17:10-17:40</td>
<td>Closing Keynote: No ID, No DX Nat Sakimura, Chairman, OpenID Foundation</td>
<td>&#8212;</td>
</tr>
<tr>
<td>17:40-17:50</td>
<td>Closing remarks: Masanori Kusunoki, Chairman, OpenID Foundation Japan</td>
<td>&#8212;</td>
</tr>
</tbody>
</table>
</figure>

<p>To register, go to: <a href="https://openid.connpass.com/event/157830/">https://openid.connpass.com/event/157830/</a></p>

<p>There are a few side events planned as well.</p>

<h2><strong><br />AB/Connect WG F2F / Workshop</strong></h2>

<p>Jan 23 (Thursday) 3:00 &#8211; 18:00 @ NRI Otemachi office (just beside the Palace) on the Connect Strategy/Next Steps.</p>

<figure class="wp-block-image size-large"><img src="http://cycle-tree.jp/wp/wp-content/uploads/2016/06/1-650x433.jpg" alt="" /></figure>

<h3><strong>Agenda</strong>:</h3>

<ol>
<li>Strategy session on how to propagate Connect to the enterprise world.</li>
<li>Plan out OpenID Connect 1.1 that leverages OAuth JAR</li>
<li>Plan out the OpenID Connect Self-Issued spec. (and DID thing perhaps.)</li>
<li>Strategy to propagate Connect to R&amp;E</li>
</ol>

<h2><strong><br />Self-Sovereign Identity Day</strong></h2>

<p>Jan 27 (Monday) 10:00 &#8211; 17:00 @ Sheraton Grande Ocean Resort (Miyazaki)</p>

<figure class="wp-block-image size-large"><img src="https://q-cf.bstatic.com/images/hotel/max1024x768/114/114947240.jpg" alt="" /></figure>

<p><iframe style="border: 0;" src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3385.069008089153!2d131.46779395025598!3d31.95902453245662!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x3538baf0cc37918d%3A0x43b963dc29ba39a8!2sSheraton%20Grande%20Ocean%20Resort!5e0!3m2!1sen!2sjp!4v1575619988014!5m2!1sen!2sjp" width="600" height="450" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>

<h2><strong><br />eKYC Workshop led by Torsten Lodderstedt and Naohiro Fujie with eKYC Discussion Group in OIDF-J</strong>.</h2>

<p>Jan 28 (Tuesday) 15:00 &#8211; 18:00 @ NRI Otemachi Office</p>

<figure class="wp-block-image size-large"><img src="http://cycle-tree.jp/wp/wp-content/uploads/2016/06/1-650x433.jpg" alt="" /></figure>

<h2><br />How to Request Seats for Side Events</h2>

<p>The capacity of the side events are extremely limited, especially for the WG meeting and eKYC Workshop. There is no guarantee for reserving a seat; in fact, it could be rather difficult. However, if you are interested to join, please make a request to OpenID Foundation Chairman Nat Sakimura through the following Google Form: <a href="https://forms.gle/2utHiJW9SuS8iAHD8">https://forms.gle/2utHiJW9SuS8iAHD8</a></p>

<p><strong>No guests that are not pre-registered and is assigned a seat will be admitted to the venue. </strong></p>

]]></content:encoded>
</item>
<item>
<title>OpenID Foundation Launches New Microsite Focused on Open Banking and Fintech Developers</title>
<link>https://openid.net/2019/12/04/openid-foundation-launches-new-microsite-focused-on-open-banking-and-fintech-developers/</link>
<pubDate>Wed, 04 Dec 2019 12:34:43 +0000</pubDate>
<dc:creator><![CDATA[Mike Leszcz]]></dc:creator>
<category><![CDATA[FAPI]]></category>
<category><![CDATA[Foundation]]></category>
<category><![CDATA[News]]></category>
<category><![CDATA[developers resources]]></category>
<category><![CDATA[Don Thibeau]]></category>
<category><![CDATA[Financial-grade API]]></category>
<category><![CDATA[open banking]]></category>
<category><![CDATA[openid]]></category>
<category><![CDATA[OpenID Connect]]></category>

<guid isPermaLink="false">http://openid.net/?p=34936</guid>
<description><![CDATA[The OpenID Foundation has launched a new microsite focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI). In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation has launched a <a href="https://www.openid.net/fapi">new microsite</a> focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI).</p>
<p>In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK Open Banking Implementation Entity (OBIE) adopted the FAPI specifications and the Foundation’s self-certification test suite as part of their Open Banking platform. FAPI-based Open Banking APIs are in now in production use in the US, Europe and elsewhere. In April 2019, the OpenID Foundation extended its Certification Program to provide self-certification for FAPI implementations.</p>
<p>FAPI work is seen by many as key to enabling incumbent and start-up financial services players build products, platforms and services consistent with the Payment Services Directive Two (PSD2). Most importantly, it gives end-users more control and security in financial interactions, while also assuring their privacy in conformance to GDPR.</p>
<p>“As a new wave of developers from the fintech community engage with OpenID Connect and FAPI, the Foundation has invested in new resources to help guide developers leading global open banking initiatives”, said Don Thibeau, OpenID Foundation Executive Director. “Many from the fintech community are getting up to speed with both OpenID Connect and FAPI. The new microsite provides an educational resource free of charge to anyone at any time for how OAuth, OpenID and FAPI specifications work together. It’s an evolving resources aimed to highlight global open banking initiatives by inviting content from members and contributors to benefit the community as a whole.”</p>
<p>The launch of this new OpenID Foundation microsite coincides with the <a href="https://fdata.global/summit/summit-2019/">Financial Data and Technology Association (FDATA) Open Finance Summit &amp; Awards 2019</a>. OIDF Chairman Nat Sakimura is among those recognized for an &#8220;Open Banking Hero Award&#8221;.</p>
<p>“Nat’s leadership in the development of the Financial-grade API (FAPI) and promotion of global open banking standards is recognized by this award nomination”, said Don Thibeau. “The Foundation is honored to have Nat nominated and recognized for his ongoing international leadership.”</p>
<p>Please visit the open banking and Financial-grade API (FAPI) microsite at: <a href="https://www.openid.net/fapi">https://www.openid.net/fapi</a>. If you have relevant content that would benefit the fintech community and would like to submit for publishing consideration, please email me at <a href="mailto:director@openid.org">director@openid.org</a></p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>Aligning the Governance Rules and Technology Tools of Digital Identity: Solving Today’s Burning Business Problems</title>
<link>https://openid.net/2019/11/14/aligning-the-governance-rules-and-technology-tools-of-digital-identity-solving-todays-burning-business-problems/</link>
<pubDate>Thu, 14 Nov 2019 17:10:27 +0000</pubDate>
<dc:creator><![CDATA[Don Thibeau]]></dc:creator>
<category><![CDATA[Case Studies]]></category>
<category><![CDATA[digital identity]]></category>
<category><![CDATA[digital transactions]]></category>
<category><![CDATA[Don Thibeau]]></category>
<category><![CDATA[oix]]></category>
<category><![CDATA[OIX white paper]]></category>
<category><![CDATA[sibos]]></category>

<guid isPermaLink="false">http://openid.net/?p=34879</guid>
<description><![CDATA[In an era governed by digital transactions and data, our methods for managing digital identities, security, and privacy are proving inadequate. At the same time, consumers are looking to do business with companies that have minimal friction as part of their overall service experience, and which provide assurance that consumer’s identities and transactions are reliable [...]]]></description>
<content:encoded><![CDATA[<p>In an era governed by digital transactions and data, our methods for managing digital identities, security, and privacy are proving inadequate. At the same time, consumers are looking to do business with companies that have minimal friction as part of their overall service experience, and which provide assurance that consumer’s identities and transactions are reliable and safe. Digital identity has matured from a first-in, first-out type of workflow to a multiple-input, multiple-output object-oriented entity, making it more difficult than ever for businesses to abide by the conventional wisdom of “If you can’t protect it, don’t collect it.”</p>
<p>Overall trust in digital ecosystems is diminishing, which overlaps with growing digital identity concerns, all relating in some way to the unauthorized release or use of personally identifying information, often on a mass scale. Compliance to regulations such as the California Consumer Privacy Act (CCPA) are coming to the entire United States, so the timing is upon us to rethink how we approach digital identity. One vision is that of a “competent authority” supporting private and public sector businesses and interested parties in building digital identity services, fit for their purposes and in their own environments that are secure, reliable, and easy to use.</p>
<p>I recently published my <a href="https://openid.net/2019/11/11/dispatch-from-innotribesibos-2019/">notes from this years Innotribe@Sibos 2019</a> where I led a discussion to review past experience as we develop and implement community-driven, open standards for digital identity and global open banking initiatives.</p>
<p>There was consensus that existing identity standards need to be utilized to ensure the identity portable and accessible across many trust frameworks. But we still have to work out how we share data among all the actors including relying parties and intermediaries. And we have to ask how we accept data shared with us? What does trust mean for others? How do we interpret their trust scores or trustmarks? How does self-certification help drive trust?</p>
<p>In parallel to preparing for presentations at Sibos, I was working on a white paper, <a href="https://openidentityexchange.org/blog/2019/11/12/aligning-the-rules-and-tools-of-digital-identity-solving-todays-burning-business-problems/">“<em>Aligning the Rules and Tools of Digital Identity: Solving Today’s Burning Business Problems”</em></a>, that advances the conversation in the current digital identity landscape. This paper essentially went “live” on a stage at Innotribe@Sibos when Eric Sachs and I revisited ten years of identity “battles”. These are a set of burning business problems facing the internet identity world that no one organization can solve alone.  This paper further marks the beginning of a new approach to solving these problems with open banking initiatives in 2020 while referencing prior OIX work and white papers.</p>
<p>It is my hope this white paper provides a perspective of digital identity solution challenges and opportunities in 2020 and beyond. Feel free to <a href="https://openidentityexchange.org/wp-content/uploads/2019/11/OIX-White-Paper_Digital-Identity-Landscape-2019_Final_2019-11-12.pdf">download the “<em>Aligning the Rules and Tools of Digital Identity: Solving Today’s Burning Business Problems”</em></a> white paper at the OIX website.</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>OpenID Connect for Identity Assurance</title>
<link>https://openid.net/2019/11/14/openid-connect-for-identity-assurance/</link>
<pubDate>Thu, 14 Nov 2019 12:58:35 +0000</pubDate>
<dc:creator><![CDATA[Mike Leszcz]]></dc:creator>
<category><![CDATA[Foundation]]></category>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[eKYC]]></category>
<category><![CDATA[Identity Assurance]]></category>
<category><![CDATA[Torsten Lodderstedt]]></category>

<guid isPermaLink="false">http://openid.net/?p=34876</guid>
<description><![CDATA[This week the OpenID Foundation announced the approval of the Implementer’s Draft of the OpenID Connect for Identity Assurance specification. This new specification is a product of the OpenID Connect Working group. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The global adoption of OpenID [...]]]></description>
<content:encoded><![CDATA[<p>This week the OpenID Foundation <a href="https://openid.net/2019/11/11/implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/">announced the approval of the Implementer’s Draft of the OpenID Connect for Identity Assurance specification</a>. This new specification is a product of the <a href="https://openid.net/wg/connect/">OpenID Connect Working group</a>. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification.</p>
<p>The global adoption of OpenID Connect is demonstrated in the many profiles it has generated. OpenID Connect’s value is seen the range of use cases it serves and its impact on the privacy, security, and ease of use it delivers to end users. As its global adoption grows, OpenID Connect is increasingly being used in scenarios requiring higher identity assurance levels. Some examples include:</p>
<ul>
<li>Anti-Money Laundering</li>
<li>Telecommunications</li>
<li>eGovernment</li>
<li>Access to Health Data</li>
<li>Risk mitigation</li>
<li>Fraud prevention</li>
</ul>
<p>One can observe that current implementations often rely on implicit attestation of the verification status of the data provided based on the context the relying party (RP) and the trust framework the IDP has joined. Implicit attestation may cause ambiguity. For example, what claims in result set are verified and which are not? As a further challenge, the RP lacks metadata and evidence needed for mapping between regulatory/legal contexts, dispute resolution, and auditing.</p>
<p>The new <a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0.html">OpenID Connect for Identity Assurance specification</a> defines a representation for verified claims and associated metadata and evidence while enabling legal compliance for the aforementioned use cases. This specification provides important support for explicit attestation in a trust framework wherein the identity provider can supply:</p>
<ul>
<li>Time of verification</li>
<li>Verifier: what party verified the user&#8217;s identity</li>
<li>Evidence: which evidence where used</li>
<li>Verification Method: how were the evidence verified</li>
</ul>
<p>The specification advances solutions for privacy wherein the RP asks for individual claims and verification data elements. This makes clear that the purpose of inquiry can be conveyed per transaction or individual claim.</p>
<p>This effort is intentionally and importantly internationally driven and benefits from contributions from the UK, US, CA, DE, and JP. The specification includes (growing number) of pre-defined identifiers for:</p>
<ul>
<li>Trust frameworks, e.g., eIDAS, NIST 800-63A, Japanese and German AML</li>
<li>Identity documents, e.g., ID Card, Passport, Driving Permit</li>
<li>Verification Methods, e.g., „“Physical In-Person Proofing” and “Supervised remote In-Person Proofing”</li>
</ul>
<p>The Foundation plans to start a new working group dedicated to eKYC and Identity Assurance. The working group’s charter has roots in contributions from the UK, US, CA, DE, and JP. We would benefit from an even broader group of participants to build on the initial contributions drawing from Torsten Lodderstedt’s domain expertise and experience at yes.com.</p>
<p>Finally thanks to Torsten, on behalf of the Foundation and community, for advancing this important specification. Bravo Torsten!</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved</title>
<link>https://openid.net/2019/11/11/implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/</link>
<pubDate>Mon, 11 Nov 2019 20:02:10 +0000</pubDate>
<dc:creator><![CDATA[Mike Jones]]></dc:creator>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[Identity Assurance]]></category>
<category><![CDATA[specification]]></category>
<category><![CDATA[vote]]></category>

<guid isPermaLink="false">http://openid.net/?p=34858</guid>
<description><![CDATA[The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of the [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft:</p>
<ul>
<li><a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0-08.html">OpenID Connect for Identity Assurance 1.0</a></li>
</ul>
<p>An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification.  This is the first Implementer’s Draft of this specification.  This specification is a product of the <a href="https://openid.net/wg/connect/">OpenID Connect Working group</a>.</p>
<p>The Implementer’s Draft is available at:</p>
<ul>
<li><a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0-ID1.html">https://openid.net/specs/openid-connect-4-identity-assurance-1_0-ID1.html</a></li>
</ul>
<p>The voting results were:</p>
<ul>
<li>Approve &#8211; 47 votes</li>
<li>Object &#8211; 1 votes</li>
<li>Abstain &#8211; 0 votes</li>
</ul>
<p>Total votes: 48 (out of 231 members = 21% > 20% quorum requirement)</p>
<p>&#8212; Michael B. Jones – OpenID Foundation Board Secretary</p>
]]></content:encoded>
</item>
<item>
<title>Dispatch from Innotribe@Sibos 2019</title>
<link>https://openid.net/2019/11/11/dispatch-from-innotribesibos-2019/</link>
<pubDate>Mon, 11 Nov 2019 15:01:35 +0000</pubDate>
<dc:creator><![CDATA[Don Thibeau]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[2019]]></category>
<category><![CDATA[Don Thibeau]]></category>
<category><![CDATA[fintech]]></category>
<category><![CDATA[identity custodian]]></category>
<category><![CDATA[identity standards]]></category>
<category><![CDATA[innotribe]]></category>
<category><![CDATA[open banking]]></category>
<category><![CDATA[sibos]]></category>

<guid isPermaLink="false">http://openid.net/?p=34852</guid>
<description><![CDATA[Innotribe is always a dynamic and thought-provoking opportunity for voices from outside the finance industry to collaborate at Sibos. At this years Sibos-2019-London, I led a panel discussion of fintech and identity experts to exchange experiences and discuss opportunities as we develop and implement community-driven, open standards for digital identity and global open banking initiatives. [...]]]></description>
<content:encoded><![CDATA[<p><img class=" wp-image-34856 alignright" src="http://openid.net/wordpress-content/uploads/2019/11/S1-300x200.png" alt="" width="239" height="159" srcset="https://openid.net/wordpress-content/uploads/2019/11/S1-300x200.png 300w, https://openid.net/wordpress-content/uploads/2019/11/S1.png 488w" sizes="(max-width: 239px) 100vw, 239px" />Innotribe is always a dynamic and thought-provoking opportunity for voices from outside the finance industry to collaborate at Sibos. At this years Sibos-2019-London, I led a panel discussion of fintech and identity experts to exchange experiences and discuss opportunities as we develop and implement community-driven, open standards for digital identity and global open banking initiatives.</p>
<p>There was consensus that existing identity standards need to be utilized to ensure the identity portable and accessible across many trust frameworks. But we still have to work out how we share data among all the actors including relying parties and intermediaries. And we have to ask how we accept data shared with us? What does trust mean for others? How do we interpret their trust score? How can self-certification help drive trust?</p>
<p>In addition to the fintech solutions and open standards discussions, there is a natural extension of that conversation addressing the consumer and the consumer experience. I also co-presented with Eric Sachs from the Microsoft Identity Team providing a retrospective of the consumer payments space and the consumer login space evolution for managing digital identity.</p>
<p><img class=" wp-image-34855 alignleft" src="http://openid.net/wordpress-content/uploads/2019/11/S2-300x200.png" alt="" width="254" height="169" srcset="https://openid.net/wordpress-content/uploads/2019/11/S2-300x200.png 300w, https://openid.net/wordpress-content/uploads/2019/11/S2.png 444w" sizes="(max-width: 254px) 100vw, 254px" />As social login evolves to support higher-assurance interactions, there is much to learn from the fintech experience. For example, fintech solutions are designed and implemented to deliver high-assurance financial services while social login through social media relies on low-assurance mechanisms. That being said, the identity community has used mobile devices and solution to improve both the usability and security of consumer login.</p>
<p>In the current environment, we find the fintech space has had success with ongoing innovation to offer more choices to users for how to pay for things while improving security and usability and leveraging global standards. Unfortunately the same cannot be said of the current consumer login landscape. There are few choices with most solutions still relying on mostly passwords and fewer examples of those improving security and usability.</p>
<p>The FIDO key standard continues to be at the forefront of discussions around consumer solutions as FIDO (Fast ID Online) is used with portable security keys. While FIDO keys actually end up raising the security bar so high that it is not clear how to help consumers recover their account if they lose the keys. There is still a lot of work to be done with respect to keys and consumer solutions.</p>
<p><img class=" wp-image-34854 alignright" src="http://openid.net/wordpress-content/uploads/2019/11/S3.png" alt="" width="204" height="179" />An innovation and topic that was highlighted at Sibos is the idea of creating identity custodians. An identity custodian could potentially be a positive force for both identity providers and consumers alike. One of the visions is that browsers and operating systems will allow consumers to install these identity custodians just as they install password managers. This would provide the consumer more control of their digital identity and associated attributes. It would allow solution providers to then develop solutions focused on the consumer while leveraging robust, standard based identity solutions already implemented by identity providers.</p>
<p>Important takeaways from our presentation are that “consumer choice” continues to drive digital identity innovation and an opportunity for increasing collaboration between financial services and mobile network operators providing identity services.</p>
<p>Progress is being made, but it is slow. There is positive light in the crossroads of enhanced consumer solutions and identity solutions that are on the horizon underpinned by established, standards-based identity services. And there is a sense of encouragement in the community about the potential convergence of innovative fintech solutions and MNO-based identity services that will continue to drive an increasing mobile world. Interesting times ahead.</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
</item>
<item>
<title>Second Public Review Period for OpenID Connect Federation Specification Started</title>
<link>https://openid.net/2019/11/07/second-public-review-period-for-openid-connect-federation-specification-started/</link>
<pubDate>Thu, 07 Nov 2019 18:00:51 +0000</pubDate>
<dc:creator><![CDATA[Mike Jones]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[federation]]></category>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[Public Review]]></category>
<category><![CDATA[specification]]></category>
<category><![CDATA[vote]]></category>

<guid isPermaLink="false">http://openid.net/?p=34844</guid>
<description><![CDATA[The OpenID OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID <a href="https://openid.net/wg/connect/">OpenID Connect Working Group</a> recommends approval of the following specification as an OpenID Implementer’s Draft:</p>
<ul>
<li><a href="https://openid.net/specs/openid-connect-federation-1_0-10.html">OpenID Connect Federation 1.0</a></li>
</ul>
<p>This would be the second Implementer’s Draft of this specification.</p>
<p>An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft in accordance with the OpenID Foundation IPR policies and procedures. Unless issues are identified during the review that the working group believes must be addressed by revising the draft, this review period will be followed by a seven-day voting period during which OpenID Foundation members will vote on whether to approve this draft as an OpenID Implementer’s Draft. For the convenience of members, voting will actually begin a week before the start of the official voting period and run for an extra week because of the holidays.</p>
<p>The relevant dates are:</p>
<ul>
<li>Implementer&#8217;s Draft public review period: Thursday, November 7, 2019 to Sunday, December 22, 2019 (45 days)</li>
<li>Implementer&#8217;s Draft vote announcement: Monday, December 9, 2019</li>
<li>Implementer&#8217;s Draft voting period: Monday, December 16, 2019 to Tuesday, January 7, 2020 *</li>
</ul>
<p>* Note: Early voting before the start of the formal voting period will be allowed.</p>
<p>The OpenID Connect working group page is <a href="https://openid.net/wg/connect/">https://openid.net/wg/connect/</a>.  Information on joining the OpenID Foundation can be found at <a href="https://openid.net/foundation/members/registration">https://openid.net/foundation/members/registration</a>.  If you’re not a current OpenID Foundation member, please consider joining to participate in the approval vote.</p>
<p>You can send feedback on the specification in a way that enables the working group to act upon it by (1) signing the contribution agreement at <a href="https://openid.net/intellectual-property/">https://openid.net/intellectual-property/</a> to join the working group (please specify that you are joining the “AB/Connect” working group on your contribution agreement), (2) joining the working group mailing list at <a href="https://lists.openid.net/mailman/listinfo/openid-specs-ab">https://lists.openid.net/mailman/listinfo/openid-specs-ab</a>, and (3) sending your feedback to the list.</p>
<p>— Michael B. Jones – OpenID Foundation Board Secretary</p>
]]></content:encoded>
</item>
</channel>
</rss>

$Bless

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="Keywords" content="domain, domain registration, registration, renewal, domain renewal, free web hosting" />
<meta name="Description" content="Brandon Gray Internet Services registers, renews, and transfers domains at discount prices while offering excellent customer service." />
<title>Brandon Gray Internet Services - Icann Accredited Registrar</title>
<script type="text/javascript" src="js/prototype.js"></script>
<script type="text/javascript" src="js/scriptaculous.js?load=effects"></script>
<script type="text/javascript" src="js/lightbox.js"></script>
<script type="text/javascript" src="js/anylink.js"></script>
<link rel="stylesheet" href="css/anylink.css" type="text/css" />
<link rel="stylesheet" href="css/style.css" type="text/css" />
<script type="text/javascript" src="js/site.js"></script>
</head>
<body>

<div id="maincontainer">
<div id="topsection">
<div id="topmenu">
<a href="index.asp">Home</a> |
<a href="cart.asp">View Cart</a> |
<a href="domainmanage.asp">Control Panel</a>&nbsp;&nbsp;
</div>
</div>
<div id="mastermenu">
<div id="slantedmenu" class="slantedmenu">
<ul>
<li><a href="index.asp">Home</a></li>
<li><a href="getname.asp?regren=N">Register a Domain</a></li>
<li><a href="getname.asp?regren=R">Renew a Domain</a></li>
<li><a href="getname.asp?regren=T">Transfer a Domain</a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu3')">Services >></a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu1')">Support >></a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu2')">Legal >></a></li>
</ul>
</div>
<div id="anylinkmenu1" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<a href="newlogin.asp">Manage Domain</a>
<a href="whois.asp">Whois</a>
<a href="contact.asp">Contact Us</a>
<a href="faq.asp">FAQ</a>
<a href="pricing.asp">Pricing</a>
<a href="abuse.asp">Report Abuse</a>
<a href="https://www.icann.org/resources/pages/benefits-2013-09-16-en" target="_blank">Registrants Benefits and Responsibilities</a>
<a href="https://www.icann.org/resources/pages/educational-2012-02-25-en" target="_blank">Registrant Educational Materials </a>

</div>
<div id="anylinkmenu2" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<a href="disclaimer.asp">Disclaimer</a>
<a href="udrp.asp">Dispute Policy </a>
<a href="privpol.asp">Privacy Policy </a>
<a href="regpol.asp">Registration Policy </a>
<a href="universal.asp">Terms of Service </a>
<a href="eddp.asp">Expiration Policy</a>
            <a href="info.asp">Corporate Info</a>

</div>
<div id="anylinkmenu3" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<!-- <a href="service-nameserver.asp">NameServers</a> -->
<a href="service-privacy.asp">Privacy Service</a>

</div>
</div>
<div id="contentwrapper">
<div id="contentcolumn">
<div class="innertube">
<div style="margin: 5px 10px 30px 10px; border: 1px solid black;padding: 10px; text-align: center;display:none;">
<h2 style="color: #112F53;">Important Notice</h2>
<h3>
Unplanned Outage on Monday, September 10th, 2018
</h3>
<p>On Monday, September 10th, 2018 we suffered an unplanned outage due to a power failure in our local area. The power outage began at 5:30am and lasted through to 1:30pm EST. Unfortunately, due to an issue with our upstream internet provider, our internet service was not restored until 10:00pm EST. The outage affected all our core services including email, websites, and phone support. All services, including DNS, Web, Email, etc. have been restored to a working state. </p>
<p>Going forward we will be reviewing our redundancy measures as they did not function as planned. We sincerely apologize for the inconvenience.</p>
<p>If you wish to discuss the matter further, please feel free to <a href="contact.asp">contact us</a>.</p>
</div>
<div class="index">
<form name="checkForm" action="getname.asp" method="post">
<p>
<input name="dom" id="dom" value="" />
<input name="searchbutton" id="searchbutton" type="submit" value="Order Now" class="button" />
<input name="pagefrom" id="pagefrom" type="hidden" value="index" /><br />
Enter the Domain you want to check (eg: yourdomain.com)
</p>
</form>
</div>
<br />
<table border="0" cellspacing="0" cellpadding="0" width="701" align="center">
<tr>
<td align="center" colspan="2">&nbsp;</td>
</tr>
</table>
<table border="0" cellspacing="0" cellpadding="0" width="701" align="center">
<tr>
<td valign="top" align="center">
<p>
<a href="http://validator.w3.org/check?uri=referer" target="_blank"><img src="images/valid-xhtml10.gif" alt="Valid XHTML 1.0 Transitional" height="31" width="88" border="0" /></a>
<a href="http://jigsaw.w3.org/css-validator/check?uri=referer" target="_blank"><img style="border:0;width:88px;height:31px" src="images/valid-css-blue.gif" alt="Valid CSS!" /></a>
</p>
<br />
</td>
</tr>
</table>
<div align="center">
<br />
<img src="images/dotcom_logo.gif" alt="" />&nbsp;&nbsp;
<img src="images/icannlogo.gif" border="0" alt="" />&nbsp;&nbsp;
<img src="images/ORG-Authorized_Registrar.gif" border="0" alt="" />&nbsp;&nbsp;
<img src="images/Logo - Website.ws.gif" alt="" />&nbsp;&nbsp;
<img src="images/dotnet_logo.gif" alt="" />
<br />Copyright &copy; 2001-2007 Brandon Gray Internet Services Inc.
<br /> All logos and trademarks on Namejuice.com are property of their respective owners.
<br /><br />
</div>
</div>
</div>
</div>
  <br class="endOfSection" />
<div id="footer">

</div>
</div>
<script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-5728835-14");
pageTracker._trackPageview();
</script>
</body>
</html>

Nick:Foaf Foaf:Nick

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="Keywords" content="domain, domain registration, registration, renewal, domain renewal, free web hosting" />
<meta name="Description" content="Brandon Gray Internet Services registers, renews, and transfers domains at discount prices while offering excellent customer service." />
<title>Brandon Gray Internet Services - Icann Accredited Registrar</title>
<script type="text/javascript" src="js/prototype.js"></script>
<script type="text/javascript" src="js/scriptaculous.js?load=effects"></script>
<script type="text/javascript" src="js/lightbox.js"></script>
<script type="text/javascript" src="js/anylink.js"></script>
<link rel="stylesheet" href="css/anylink.css" type="text/css" />
<link rel="stylesheet" href="css/style.css" type="text/css" />
<script type="text/javascript" src="js/site.js"></script>
</head>
<body>

<div id="maincontainer">
<div id="topsection">
<div id="topmenu">
<a href="index.asp">Home</a> |
<a href="cart.asp">View Cart</a> |
<a href="domainmanage.asp">Control Panel</a>&nbsp;&nbsp;
</div>
</div>
<div id="mastermenu">
<div id="slantedmenu" class="slantedmenu">
<ul>
<li><a href="index.asp">Home</a></li>
<li><a href="getname.asp?regren=N">Register a Domain</a></li>
<li><a href="getname.asp?regren=R">Renew a Domain</a></li>
<li><a href="getname.asp?regren=T">Transfer a Domain</a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu3')">Services >></a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu1')">Support >></a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu2')">Legal >></a></li>
</ul>
</div>
<div id="anylinkmenu1" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<a href="newlogin.asp">Manage Domain</a>
<a href="whois.asp">Whois</a>
<a href="contact.asp">Contact Us</a>
<a href="faq.asp">FAQ</a>
<a href="pricing.asp">Pricing</a>
<a href="abuse.asp">Report Abuse</a>
<a href="https://www.icann.org/resources/pages/benefits-2013-09-16-en" target="_blank">Registrants Benefits and Responsibilities</a>
<a href="https://www.icann.org/resources/pages/educational-2012-02-25-en" target="_blank">Registrant Educational Materials </a>

</div>
<div id="anylinkmenu2" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<a href="disclaimer.asp">Disclaimer</a>
<a href="udrp.asp">Dispute Policy </a>
<a href="privpol.asp">Privacy Policy </a>
<a href="regpol.asp">Registration Policy </a>
<a href="universal.asp">Terms of Service </a>
<a href="eddp.asp">Expiration Policy</a>
            <a href="info.asp">Corporate Info</a>

</div>
<div id="anylinkmenu3" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<!-- <a href="service-nameserver.asp">NameServers</a> -->
<a href="service-privacy.asp">Privacy Service</a>

</div>
</div>
<div id="contentwrapper">
<div id="contentcolumn">
<div class="innertube">
<div style="margin: 5px 10px 30px 10px; border: 1px solid black;padding: 10px; text-align: center;display:none;">
<h2 style="color: #112F53;">Important Notice</h2>
<h3>
Unplanned Outage on Monday, September 10th, 2018
</h3>
<p>On Monday, September 10th, 2018 we suffered an unplanned outage due to a power failure in our local area. The power outage began at 5:30am and lasted through to 1:30pm EST. Unfortunately, due to an issue with our upstream internet provider, our internet service was not restored until 10:00pm EST. The outage affected all our core services including email, websites, and phone support. All services, including DNS, Web, Email, etc. have been restored to a working state. </p>
<p>Going forward we will be reviewing our redundancy measures as they did not function as planned. We sincerely apologize for the inconvenience.</p>
<p>If you wish to discuss the matter further, please feel free to <a href="contact.asp">contact us</a>.</p>
</div>
<div class="index">
<form name="checkForm" action="getname.asp" method="post">
<p>
<input name="dom" id="dom" value="" />
<input name="searchbutton" id="searchbutton" type="submit" value="Order Now" class="button" />
<input name="pagefrom" id="pagefrom" type="hidden" value="index" /><br />
Enter the Domain you want to check (eg: yourdomain.com)
</p>
</form>
</div>
<br />
<table border="0" cellspacing="0" cellpadding="0" width="701" align="center">
<tr>
<td align="center" colspan="2">&nbsp;</td>
</tr>
</table>
<table border="0" cellspacing="0" cellpadding="0" width="701" align="center">
<tr>
<td valign="top" align="center">
<p>
<a href="http://validator.w3.org/check?uri=referer" target="_blank"><img src="images/valid-xhtml10.gif" alt="Valid XHTML 1.0 Transitional" height="31" width="88" border="0" /></a>
<a href="http://jigsaw.w3.org/css-validator/check?uri=referer" target="_blank"><img style="border:0;width:88px;height:31px" src="images/valid-css-blue.gif" alt="Valid CSS!" /></a>
</p>
<br />
</td>
</tr>
</table>
<div align="center">
<br />
<img src="images/dotcom_logo.gif" alt="" />&nbsp;&nbsp;
<img src="images/icannlogo.gif" border="0" alt="" />&nbsp;&nbsp;
<img src="images/ORG-Authorized_Registrar.gif" border="0" alt="" />&nbsp;&nbsp;
<img src="images/Logo - Website.ws.gif" alt="" />&nbsp;&nbsp;
<img src="images/dotnet_logo.gif" alt="" />
<br />Copyright &copy; 2001-2007 Brandon Gray Internet Services Inc.
<br /> All logos and trademarks on Namejuice.com are property of their respective owners.
<br /><br />
</div>
</div>
</div>
</div>
  <br class="endOfSection" />
<div id="footer">

</div>
</div>
<script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-5728835-14");
pageTracker._trackPageview();
</script>
</body>
</html>

$hostname

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<meta name="Keywords" content="domain, domain registration, registration, renewal, domain renewal, free web hosting" />
<meta name="Description" content="Brandon Gray Internet Services registers, renews, and transfers domains at discount prices while offering excellent customer service." />
<title>Brandon Gray Internet Services - Icann Accredited Registrar</title>
<script type="text/javascript" src="js/prototype.js"></script>
<script type="text/javascript" src="js/scriptaculous.js?load=effects"></script>
<script type="text/javascript" src="js/lightbox.js"></script>
<script type="text/javascript" src="js/anylink.js"></script>
<link rel="stylesheet" href="css/anylink.css" type="text/css" />
<link rel="stylesheet" href="css/style.css" type="text/css" />
<script type="text/javascript" src="js/site.js"></script>
</head>
<body>

<div id="maincontainer">
<div id="topsection">
<div id="topmenu">
<a href="index.asp">Home</a> |
<a href="cart.asp">View Cart</a> |
<a href="domainmanage.asp">Control Panel</a>&nbsp;&nbsp;
</div>
</div>
<div id="mastermenu">
<div id="slantedmenu" class="slantedmenu">
<ul>
<li><a href="index.asp">Home</a></li>
<li><a href="getname.asp?regren=N">Register a Domain</a></li>
<li><a href="getname.asp?regren=R">Renew a Domain</a></li>
<li><a href="getname.asp?regren=T">Transfer a Domain</a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu3')">Services >></a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu1')">Support >></a></li>
<li><a href="#" onclick="return clickreturnvalue()" onmouseover="dropdownmenu(this, event, 'anylinkmenu2')">Legal >></a></li>
</ul>
</div>
<div id="anylinkmenu1" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<a href="newlogin.asp">Manage Domain</a>
<a href="whois.asp">Whois</a>
<a href="contact.asp">Contact Us</a>
<a href="faq.asp">FAQ</a>
<a href="pricing.asp">Pricing</a>
<a href="abuse.asp">Report Abuse</a>
<a href="https://www.icann.org/resources/pages/benefits-2013-09-16-en" target="_blank">Registrants Benefits and Responsibilities</a>
<a href="https://www.icann.org/resources/pages/educational-2012-02-25-en" target="_blank">Registrant Educational Materials </a>

</div>
<div id="anylinkmenu2" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<a href="disclaimer.asp">Disclaimer</a>
<a href="udrp.asp">Dispute Policy </a>
<a href="privpol.asp">Privacy Policy </a>
<a href="regpol.asp">Registration Policy </a>
<a href="universal.asp">Terms of Service </a>
<a href="eddp.asp">Expiration Policy</a>
            <a href="info.asp">Corporate Info</a>

</div>
<div id="anylinkmenu3" class="anylinkcss" style="width: 150px; background-color: #CED5DD">

<!-- <a href="service-nameserver.asp">NameServers</a> -->
<a href="service-privacy.asp">Privacy Service</a>

</div>
</div>
<div id="contentwrapper">
<div id="contentcolumn">
<div class="innertube">
<div style="margin: 5px 10px 30px 10px; border: 1px solid black;padding: 10px; text-align: center;display:none;">
<h2 style="color: #112F53;">Important Notice</h2>
<h3>
Unplanned Outage on Monday, September 10th, 2018
</h3>
<p>On Monday, September 10th, 2018 we suffered an unplanned outage due to a power failure in our local area. The power outage began at 5:30am and lasted through to 1:30pm EST. Unfortunately, due to an issue with our upstream internet provider, our internet service was not restored until 10:00pm EST. The outage affected all our core services including email, websites, and phone support. All services, including DNS, Web, Email, etc. have been restored to a working state. </p>
<p>Going forward we will be reviewing our redundancy measures as they did not function as planned. We sincerely apologize for the inconvenience.</p>
<p>If you wish to discuss the matter further, please feel free to <a href="contact.asp">contact us</a>.</p>
</div>
<div class="index">
<form name="checkForm" action="getname.asp" method="post">
<p>
<input name="dom" id="dom" value="" />
<input name="searchbutton" id="searchbutton" type="submit" value="Order Now" class="button" />
<input name="pagefrom" id="pagefrom" type="hidden" value="index" /><br />
Enter the Domain you want to check (eg: yourdomain.com)
</p>
</form>
</div>
<br />
<table border="0" cellspacing="0" cellpadding="0" width="701" align="center">
<tr>
<td align="center" colspan="2">&nbsp;</td>
</tr>
</table>
<table border="0" cellspacing="0" cellpadding="0" width="701" align="center">
<tr>
<td valign="top" align="center">
<p>
<a href="http://validator.w3.org/check?uri=referer" target="_blank"><img src="images/valid-xhtml10.gif" alt="Valid XHTML 1.0 Transitional" height="31" width="88" border="0" /></a>
<a href="http://jigsaw.w3.org/css-validator/check?uri=referer" target="_blank"><img style="border:0;width:88px;height:31px" src="images/valid-css-blue.gif" alt="Valid CSS!" /></a>
</p>
<br />
</td>
</tr>
</table>
<div align="center">
<br />
<img src="images/dotcom_logo.gif" alt="" />&nbsp;&nbsp;
<img src="images/icannlogo.gif" border="0" alt="" />&nbsp;&nbsp;
<img src="images/ORG-Authorized_Registrar.gif" border="0" alt="" />&nbsp;&nbsp;
<img src="images/Logo - Website.ws.gif" alt="" />&nbsp;&nbsp;
<img src="images/dotnet_logo.gif" alt="" />
<br />Copyright &copy; 2001-2007 Brandon Gray Internet Services Inc.
<br /> All logos and trademarks on Namejuice.com are property of their respective owners.
<br /><br />
</div>
</div>
</div>
</div>
  <br class="endOfSection" />
<div id="footer">

</div>
</div>
<script type="text/javascript">
var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");
document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));
</script>
<script type="text/javascript">
var pageTracker = _gat._getTracker("UA-5728835-14");
pageTracker._trackPageview();
</script>
</body>
</html>

$Eagle's Phone

https://www.google.com/search?q=netbeans&ie=utf-8&oe=utf-8&client=firefox-b

PNY

<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
>

<channel>
<title>OpenID</title>
<atom:link href="https://openid.net/feed/" rel="self" type="application/rss+xml" />
<link>https://openid.net</link>
<description>The Internet Identity Layer</description>
<lastBuildDate>Sat, 28 Dec 2019 12:05:11 +0000</lastBuildDate>
<language>en-US</language>
<sy:updatePeriod>
hourly </sy:updatePeriod>
<sy:updateFrequency>
1 </sy:updateFrequency>
<generator>https://wordpress.org/?v=5.2.5</generator>
<atom:link rel='hub' href='https://openid.net/?pushpress=hub'/>
<item>
<title>OpenID Connect for Identity Assurance now has a dedicated home</title>
<link>https://openid.net/2019/12/28/openid-connect-for-identity-assurance-now-has-a-dedicated-home/</link>
<pubDate>Sat, 28 Dec 2019 12:05:11 +0000</pubDate>
<dc:creator><![CDATA[Torsten Lodderstedt]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[eKYC]]></category>
<category><![CDATA[Identity Assurance]]></category>

<guid isPermaLink="false">http://openid.net/?p=35072</guid>
<description><![CDATA[The OpenID Foundation has started the new eKYC and Identity Assurance Working Group, which will develop OpenID specifications for providing Relying Parties with identity information, i.e. Verified Claims, along with an explicit attestation of the verification status of those Claims (what, how, when, according to what rules, using what evidence).  “eKYC” is an industry acronym [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation has started the new eKYC and Identity Assurance Working Group, which will develop OpenID specifications for providing Relying Parties with identity information, i.e. Verified Claims, along with an explicit attestation of the verification status of those Claims (what, how, when, according to what rules, using what evidence).  “eKYC” is an industry acronym for “electronic Know Your Customer”.  The starting point will be the recently approved <a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0.html">OpenID Connect for Identity Assurance</a> draft that was developed by the OpenID Connect Working Group.</p>
<p>More information about the working group can be found at <a href="https://openid.net/wg/ekyc-ida/">https://openid.net/wg/ekyc-ida/</a>.  This page includes information on joining the working group and its mailing list.  The first official call of the new eKYC and Identity Assurance working group will take place on the 8th of January 2020 at 4pm (CET).</p>
]]></content:encoded>
</item>
<item>
<title>Notice of Vote for Second Implementer’s Draft of OpenID Connect Federation Specification</title>
<link>https://openid.net/2019/12/13/notice-of-vote-for-second-implementers-draft-of-openid-connect-federation-specification/</link>
<pubDate>Sat, 14 Dec 2019 03:42:50 +0000</pubDate>
<dc:creator><![CDATA[Mike Jones]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[federation]]></category>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[Public Review]]></category>
<category><![CDATA[specification]]></category>
<category><![CDATA[vote]]></category>

<guid isPermaLink="false">http://openid.net/?p=34972</guid>
<description><![CDATA[The official voting period will be between Monday, December 16, 2019 and Tuesday, January 7, 2020, following the 45 day review of the specification. For the convenience of members, voting will actually open on Monday, December 16, 2019 for members who have completed their reviews by then, with the voting period ending on Tuesday, January [...]]]></description>
<content:encoded><![CDATA[<p>The official voting period will be between Monday, December 16, 2019 and Tuesday, January 7, 2020, following the <a href="https://openid.net/2019/11/07/second-public-review-period-for-openid-connect-federation-specification-started/">45 day review</a> of the specification. For the convenience of members, voting will actually open on Monday, December 16, 2019 for members who have completed their reviews by then, with the voting period ending on Tuesday, January 7, 2020, running for extra time because of the holidays.</p>
<p>The OpenID Connect Working Group page is <a href="https://openid.net/wg/connect/">https://openid.net/wg/connect/</a>. If you’re not already a member, or if your membership has expired, please consider joining to participate in the approval vote. Information on joining the OpenID Foundation can be found at <a href="https://openid.net/foundation/members/registration">https://openid.net/foundation/members/registration</a>.</p>
<p>The vote will be conducted at <a href="https://openid.net/foundation/members/polls/196">https://openid.net/foundation/members/polls/196</a>.</p>
<p>– Michael B. Jones, OpenID Foundation Secretary</p>
]]></content:encoded>
</item>
<item>
<title>“Plays Well with Others”, the OpenID Foundation Recognized as a Global Top 10 Influencing Organization in Digital Identity</title>
<link>https://openid.net/2019/12/13/plays-well-with-others-the-openid-foundation-recognized-as-a-global-top-10-influencing-organization-in-digital-identity/</link>
<pubDate>Fri, 13 Dec 2019 15:28:22 +0000</pubDate>
<dc:creator><![CDATA[Don Thibeau]]></dc:creator>
<category><![CDATA[Foundation]]></category>
<category><![CDATA[News]]></category>
<category><![CDATA[Dakota Gruener]]></category>
<category><![CDATA[digital identity]]></category>
<category><![CDATA[Emma Lindley]]></category>
<category><![CDATA[Financial Data and Technology Association]]></category>
<category><![CDATA[financial data exchange]]></category>
<category><![CDATA[GÉANT Association]]></category>
<category><![CDATA[goode intelligence]]></category>
<category><![CDATA[GSMA]]></category>
<category><![CDATA[ID2020]]></category>
<category><![CDATA[ID4D]]></category>
<category><![CDATA[liaison agreements]]></category>
<category><![CDATA[liaisons]]></category>
<category><![CDATA[open banking implementation entity]]></category>
<category><![CDATA[pam dingle]]></category>
<category><![CDATA[top 10 influencing organization]]></category>
<category><![CDATA[Vyjayanti Desai]]></category>
<category><![CDATA[women in identity]]></category>

<guid isPermaLink="false">http://openid.net/?p=34969</guid>
<description><![CDATA[The OpenID Foundation has been recognized in the recently published The Digital Identity Report – The Global Opportunity for Verified Citizen &#38; Consumer ID, as one of the top 10 global digital identity-influencing organizations that includes the OpenID Foundation. Alan Goode, founder and CEO of Goode Intelligence and author of the report, said “the digital identity [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation has been recognized in the recently published <a href="https://www.goodeintelligence.com/press-releases/goode-intelligence-reveals-top-10-digital-identity-influencing-organisations/"><em>The</em> <em>Digital Identity Report – The Global Opportunity for Verified Citizen &amp; Consumer ID</em></a>, as one of the top 10 global digital identity-influencing organizations that includes the OpenID Foundation.</p>
<p>Alan Goode, founder and CEO of Goode Intelligence and author of the report, said “the digital identity industry is incredibly vibrant with many influencing organisations shaping how digital identity is designed and deployed.  These 10 organisations represent those that we have found to be the most influential throughout our research and we are delighted to announce the names of these highly deserving organisations today.”</p>
<p><em>The</em> <em>Digital Identity Report</em> examines the market for both government and commercial scheme issued digital identities around the world in three digital identity models: Centralised, Federated and Self-Sovereign.  The 230-page report includes a comprehensive review of current global adoption, market analysis including key drivers and barriers for adoption, technology analysis and profiles of companies supplying products and services in this area along with detailed (regional and global) for digital identity (segmented into current important vertical sectors), biometric technology and revenue within the six-year period 2020 to 2025.</p>
<p>Technical standards are only as good as their implementations. The Foundation owes much of its success as a leader in digital identity through a focus on liaison agreements with leading organizations in specific sectors. The work of the Financial Grade API Working Group helps extend a wide variety of implementations of OpenID Connect profiles while also driving some of these liaison relationships. Recent examples of these liaison relationships include our member organizations the GSMA and the UK’s Open Banking Implementation Entity (OBIE) as well as the Financial Data Exchange (FDX), the Financial Data and Technology Association (FDATA) and others.</p>
<p>Liaison agreements are only as good as the concrete value they produce. The OIDF’s Board recently approved substantial investments of human and financial capital in our partnerships in 2020. We’ve donated exhibition space to the Women in Identity at the upcoming Identiverse Conference. We’ve recently approved funding of federation standards development to continue our successful collaboration with Europe’s GÉANT Association. Our close coordination will be demonstrated throughout 2020 in a major conference in Tokyo hosted by the OpenID Foundation Japan, and in the UK in joint workshops with the Open Identity Exchange (OIX),</p>
<p>Collaboration is only as good as the commitment of people. Therefore, on behalf of the OpenID Foundation board of directors, I would like to congratulate our friends and colleagues Vyjayanti Desai of the <a href="https://id4d.worldbank.org/global-dataset">World Bank’s ID4D,</a> Dakota Gruener at <a href="https://id2020.org/">ID2020</a>, Emma Lindley and Pam Dingle, Co-Founders of the <a href="https://womeninidentity.org/">Women in Identity</a> for much deserved recognition in the <em>The</em> <em>Digital Identity Report</em>. We look forward to continuing to work with these organizations and others to help enable digital identities globally.</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>OpenID Summit Tokyo 2020 and Side Events Registrations Are Open</title>
<link>https://openid.net/2019/12/06/openid-summit-tokyo-2020-and-side-events-registrations-are-open/</link>
<pubDate>Fri, 06 Dec 2019 12:29:14 +0000</pubDate>
<dc:creator><![CDATA[Nat Sakimura]]></dc:creator>
<category><![CDATA[Japan]]></category>
<category><![CDATA[Summit Events]]></category>
<category><![CDATA[Technology Events]]></category>
<category><![CDATA[events]]></category>
<category><![CDATA[OpenID Summit]]></category>
<category><![CDATA[Tokyo]]></category>

<guid isPermaLink="false">http://openid.net/?p=34948</guid>
<description><![CDATA[Every four years, OpenID Foundation Japan has an educational meeting called &#8220;OpenID Summit Tokyo&#8221;. The next one is coming up on January 24, 2020. This year it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo. The schedule is as follows: OpenID Summit Tokyo 2020 Jan 24, 2020 @ Shibuya [...]]]></description>
<content:encoded><![CDATA[
<p>Every four years, OpenID Foundation Japan has an educational meeting called &#8220;OpenID Summit Tokyo&#8221;. The next one is coming up on January 24, 2020. This year it will be at a brand new venue called Shibuya Stream Hall in Shibuya, Tokyo.</p>

<p>The schedule is as follows:</p>

<h2>OpenID Summit Tokyo 2020</h2>

<p>Jan 24, 2020 @ <a href="http://stream-hall.jp/">Shibuya Stream Hall</a></p>

<figure class="wp-block-image size-large"><img src="http://stream-hall.jp/wordpress/wp-content/uploads/2017/10/shibuya-stream-0014.jpg" alt="" /></figure>

<p><iframe style="border: 0;" src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3241.7908603890687!2d139.70029135035767!3d35.65752403878295!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x60188b5997e18dc9%3A0x4e339e5573667786!2sShibuya%20Stream%20Hall!5e0!3m2!1sen!2sjp!4v1575620452886!5m2!1sen!2sjp" width="600" height="450" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>

<figure class="wp-block-table has-subtle-light-gray-background-color has-background">
<table class="has-fixed-layout">
<tbody>
<tr>
<td><strong>Time </strong></td>
<td><strong>Grand Hall</strong></td>
<td><strong>Breakout Room</strong></td>
</tr>
<tr>
<td>10:00-10:10</td>
<td>Opening Remark Masanori Kusunoki, Chair, OpenID Foundation Japan</td>
<td>&#8212;</td>
</tr>
<tr>
<td>10:10-10:40</td>
<td>Keynote 1 Identity 2020, 2025, and 2030 Ian Glazer, Director, Salesforce</td>
<td>&#8212;</td>
</tr>
<tr>
<td>10:40-11:10</td>
<td>Keynote 2 True Human Identity in the Digital Realm Kim Cameron</td>
<td>Talk to Evangelists</td>
</tr>
<tr>
<td>11:10-11:40</td>
<td>Keynote 3 Enabling large-scale multi-party federations with OpenID Connect Mike Jones</td>
<td>Talk to Evangelists</td>
</tr>
<tr>
<td>11:40-12:30</td>
<td>Break</td>
<td>&#8212;</td>
</tr>
<tr>
<td>12:30-13:00</td>
<td>Open Banking beyond PSD2 in the EU Torsten Lodderstedt Yes</td>
<td>Device Identity as Yet Untold &#8211; Enterprise Security and Device Identity (Kengo Suzuki)</td>
</tr>
<tr>
<td>13:00-13:30</td>
<td>Financial API Updates</td>
<td>WebAuthn using Cloud-assisted BLE (caBLE) (Yoshihiko Nagoya, Lepidum)</td>
</tr>
<tr>
<td>13:30-14:00</td>
<td>Updates on OIDF-J KYC WG Naohiro Fujie, Member of the board, OpenID Foundation Japan</td>
<td>Digital-Keep platform that enables secure rights transactions through the establishment of Digital Identity and eKYC/OIDC (Hiroshi Yamamoto, BitKey)</td>
</tr>
<tr>
<td>14:00-14:30</td>
<td>Updates on the FIDO/eKYC/DID in Korea and the prospects on the future (Bradly Kim, R&amp;D Center/CTO, RaonSecure Co., Ltd.)</td>
<td>Updates on the specs surrounding Native Apps and OpenID Connect (Kazuki Tsuzuki, Yahoo Japan)</td>
</tr>
<tr>
<td>14:30-14:50</td>
<td>Break</td>
<td>&#8212;</td>
</tr>
<tr>
<td>14:50-15:20</td>
<td>Sponsor Session (1): Identity proofing as the key to the second generation IDaaS &#8211; NIST, Supply Chain Security and Orphan ID &#8211; (Jun’ichi Egawa, CEO, Exgen Network Inc.)</td>
<td>Authentication Design Patterns using FIDO (WebAuthN) (Toshiki Matsui, KDDI)</td>
</tr>
<tr>
<td>15:20-15:50</td>
<td>Sponsor Session (2): A deployment case on the unified secure identity management with FIDO and Social Network Identities &#8211; Introduction to a cloud identity platform “SELMID” (Kyoka Hanai, Western Japan Business Development Team, CTC Solutions)</td>
<td>Introduction to OpenID Connect Client Initiated Backchannel Authentication Flow (CIBA)&#8211; New User Experience and implementation examples (Takehisa Shibata, Takumi Akaboshi, NRI Secure Technologies)</td>
</tr>
<tr>
<td>15:50-16:20</td>
<td>Updates on the gBizID that utilizes OpenID Connect (Hisafumi Mitsushio, Ministry of Economy, Advisor to CIO, Trade and Industry, Japan)OpenID Connect</td>
<td>Our Identity Experience (Andrew Hindle, Board Member, IDPro; Content Chair, Identiverse)</td>
</tr>
<tr>
<td>16:20-16:50</td>
<td>Research data management space that NII promotes (Kaz Yamaji, Professor, National Insititute of Informatics)</td>
<td>&#8212;</td>
</tr>
<tr>
<td>16:50-17:10</td>
<td>Break</td>
<td>&#8212;</td>
</tr>
<tr>
<td>17:10-17:40</td>
<td>Closing Keynote: No ID, No DX Nat Sakimura, Chairman, OpenID Foundation</td>
<td>&#8212;</td>
</tr>
<tr>
<td>17:40-17:50</td>
<td>Closing remarks: Masanori Kusunoki, Chairman, OpenID Foundation Japan</td>
<td>&#8212;</td>
</tr>
</tbody>
</table>
</figure>

<p>To register, go to: <a href="https://openid.connpass.com/event/157830/">https://openid.connpass.com/event/157830/</a></p>

<p>There are a few side events planned as well.</p>

<h2><strong><br />AB/Connect WG F2F / Workshop</strong></h2>

<p>Jan 23 (Thursday) 3:00 &#8211; 18:00 @ NRI Otemachi office (just beside the Palace) on the Connect Strategy/Next Steps.</p>

<figure class="wp-block-image size-large"><img src="http://cycle-tree.jp/wp/wp-content/uploads/2016/06/1-650x433.jpg" alt="" /></figure>

<h3><strong>Agenda</strong>:</h3>

<ol>
<li>Strategy session on how to propagate Connect to the enterprise world.</li>
<li>Plan out OpenID Connect 1.1 that leverages OAuth JAR</li>
<li>Plan out the OpenID Connect Self-Issued spec. (and DID thing perhaps.)</li>
<li>Strategy to propagate Connect to R&amp;E</li>
</ol>

<h2><strong><br />Self-Sovereign Identity Day</strong></h2>

<p>Jan 27 (Monday) 10:00 &#8211; 17:00 @ Sheraton Grande Ocean Resort (Miyazaki)</p>

<figure class="wp-block-image size-large"><img src="https://q-cf.bstatic.com/images/hotel/max1024x768/114/114947240.jpg" alt="" /></figure>

<p><iframe style="border: 0;" src="https://www.google.com/maps/embed?pb=!1m18!1m12!1m3!1d3385.069008089153!2d131.46779395025598!3d31.95902453245662!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x3538baf0cc37918d%3A0x43b963dc29ba39a8!2sSheraton%20Grande%20Ocean%20Resort!5e0!3m2!1sen!2sjp!4v1575619988014!5m2!1sen!2sjp" width="600" height="450" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>

<h2><strong><br />eKYC Workshop led by Torsten Lodderstedt and Naohiro Fujie with eKYC Discussion Group in OIDF-J</strong>.</h2>

<p>Jan 28 (Tuesday) 15:00 &#8211; 18:00 @ NRI Otemachi Office</p>

<figure class="wp-block-image size-large"><img src="http://cycle-tree.jp/wp/wp-content/uploads/2016/06/1-650x433.jpg" alt="" /></figure>

<h2><br />How to Request Seats for Side Events</h2>

<p>The capacity of the side events are extremely limited, especially for the WG meeting and eKYC Workshop. There is no guarantee for reserving a seat; in fact, it could be rather difficult. However, if you are interested to join, please make a request to OpenID Foundation Chairman Nat Sakimura through the following Google Form: <a href="https://forms.gle/2utHiJW9SuS8iAHD8">https://forms.gle/2utHiJW9SuS8iAHD8</a></p>

<p><strong>No guests that are not pre-registered and is assigned a seat will be admitted to the venue. </strong></p>

]]></content:encoded>
</item>
<item>
<title>OpenID Foundation Launches New Microsite Focused on Open Banking and Fintech Developers</title>
<link>https://openid.net/2019/12/04/openid-foundation-launches-new-microsite-focused-on-open-banking-and-fintech-developers/</link>
<pubDate>Wed, 04 Dec 2019 12:34:43 +0000</pubDate>
<dc:creator><![CDATA[Mike Leszcz]]></dc:creator>
<category><![CDATA[FAPI]]></category>
<category><![CDATA[Foundation]]></category>
<category><![CDATA[News]]></category>
<category><![CDATA[developers resources]]></category>
<category><![CDATA[Don Thibeau]]></category>
<category><![CDATA[Financial-grade API]]></category>
<category><![CDATA[open banking]]></category>
<category><![CDATA[openid]]></category>
<category><![CDATA[OpenID Connect]]></category>

<guid isPermaLink="false">http://openid.net/?p=34936</guid>
<description><![CDATA[The OpenID Foundation has launched a new microsite focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI). In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation has launched a <a href="https://www.openid.net/fapi">new microsite</a> focused on global open banking initiatives and providing resources for fintech developers implementing the Foundation’s Financial-grade API (FAPI).</p>
<p>In 2017, the OpenID Foundation’s Financial-grade API (FAPI) Working Group published specifications enabling high-security API access, suitable for accessing financial data and facilitating financial transactions. In 2018, the UK Open Banking Implementation Entity (OBIE) adopted the FAPI specifications and the Foundation’s self-certification test suite as part of their Open Banking platform. FAPI-based Open Banking APIs are in now in production use in the US, Europe and elsewhere. In April 2019, the OpenID Foundation extended its Certification Program to provide self-certification for FAPI implementations.</p>
<p>FAPI work is seen by many as key to enabling incumbent and start-up financial services players build products, platforms and services consistent with the Payment Services Directive Two (PSD2). Most importantly, it gives end-users more control and security in financial interactions, while also assuring their privacy in conformance to GDPR.</p>
<p>“As a new wave of developers from the fintech community engage with OpenID Connect and FAPI, the Foundation has invested in new resources to help guide developers leading global open banking initiatives”, said Don Thibeau, OpenID Foundation Executive Director. “Many from the fintech community are getting up to speed with both OpenID Connect and FAPI. The new microsite provides an educational resource free of charge to anyone at any time for how OAuth, OpenID and FAPI specifications work together. It’s an evolving resources aimed to highlight global open banking initiatives by inviting content from members and contributors to benefit the community as a whole.”</p>
<p>The launch of this new OpenID Foundation microsite coincides with the <a href="https://fdata.global/summit/summit-2019/">Financial Data and Technology Association (FDATA) Open Finance Summit &amp; Awards 2019</a>. OIDF Chairman Nat Sakimura is among those recognized for an &#8220;Open Banking Hero Award&#8221;.</p>
<p>“Nat’s leadership in the development of the Financial-grade API (FAPI) and promotion of global open banking standards is recognized by this award nomination”, said Don Thibeau. “The Foundation is honored to have Nat nominated and recognized for his ongoing international leadership.”</p>
<p>Please visit the open banking and Financial-grade API (FAPI) microsite at: <a href="https://www.openid.net/fapi">https://www.openid.net/fapi</a>. If you have relevant content that would benefit the fintech community and would like to submit for publishing consideration, please email me at <a href="mailto:director@openid.org">director@openid.org</a></p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>Aligning the Governance Rules and Technology Tools of Digital Identity: Solving Today’s Burning Business Problems</title>
<link>https://openid.net/2019/11/14/aligning-the-governance-rules-and-technology-tools-of-digital-identity-solving-todays-burning-business-problems/</link>
<pubDate>Thu, 14 Nov 2019 17:10:27 +0000</pubDate>
<dc:creator><![CDATA[Don Thibeau]]></dc:creator>
<category><![CDATA[Case Studies]]></category>
<category><![CDATA[digital identity]]></category>
<category><![CDATA[digital transactions]]></category>
<category><![CDATA[Don Thibeau]]></category>
<category><![CDATA[oix]]></category>
<category><![CDATA[OIX white paper]]></category>
<category><![CDATA[sibos]]></category>

<guid isPermaLink="false">http://openid.net/?p=34879</guid>
<description><![CDATA[In an era governed by digital transactions and data, our methods for managing digital identities, security, and privacy are proving inadequate. At the same time, consumers are looking to do business with companies that have minimal friction as part of their overall service experience, and which provide assurance that consumer’s identities and transactions are reliable [...]]]></description>
<content:encoded><![CDATA[<p>In an era governed by digital transactions and data, our methods for managing digital identities, security, and privacy are proving inadequate. At the same time, consumers are looking to do business with companies that have minimal friction as part of their overall service experience, and which provide assurance that consumer’s identities and transactions are reliable and safe. Digital identity has matured from a first-in, first-out type of workflow to a multiple-input, multiple-output object-oriented entity, making it more difficult than ever for businesses to abide by the conventional wisdom of “If you can’t protect it, don’t collect it.”</p>
<p>Overall trust in digital ecosystems is diminishing, which overlaps with growing digital identity concerns, all relating in some way to the unauthorized release or use of personally identifying information, often on a mass scale. Compliance to regulations such as the California Consumer Privacy Act (CCPA) are coming to the entire United States, so the timing is upon us to rethink how we approach digital identity. One vision is that of a “competent authority” supporting private and public sector businesses and interested parties in building digital identity services, fit for their purposes and in their own environments that are secure, reliable, and easy to use.</p>
<p>I recently published my <a href="https://openid.net/2019/11/11/dispatch-from-innotribesibos-2019/">notes from this years Innotribe@Sibos 2019</a> where I led a discussion to review past experience as we develop and implement community-driven, open standards for digital identity and global open banking initiatives.</p>
<p>There was consensus that existing identity standards need to be utilized to ensure the identity portable and accessible across many trust frameworks. But we still have to work out how we share data among all the actors including relying parties and intermediaries. And we have to ask how we accept data shared with us? What does trust mean for others? How do we interpret their trust scores or trustmarks? How does self-certification help drive trust?</p>
<p>In parallel to preparing for presentations at Sibos, I was working on a white paper, <a href="https://openidentityexchange.org/blog/2019/11/12/aligning-the-rules-and-tools-of-digital-identity-solving-todays-burning-business-problems/">“<em>Aligning the Rules and Tools of Digital Identity: Solving Today’s Burning Business Problems”</em></a>, that advances the conversation in the current digital identity landscape. This paper essentially went “live” on a stage at Innotribe@Sibos when Eric Sachs and I revisited ten years of identity “battles”. These are a set of burning business problems facing the internet identity world that no one organization can solve alone.  This paper further marks the beginning of a new approach to solving these problems with open banking initiatives in 2020 while referencing prior OIX work and white papers.</p>
<p>It is my hope this white paper provides a perspective of digital identity solution challenges and opportunities in 2020 and beyond. Feel free to <a href="https://openidentityexchange.org/wp-content/uploads/2019/11/OIX-White-Paper_Digital-Identity-Landscape-2019_Final_2019-11-12.pdf">download the “<em>Aligning the Rules and Tools of Digital Identity: Solving Today’s Burning Business Problems”</em></a> white paper at the OIX website.</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>OpenID Connect for Identity Assurance</title>
<link>https://openid.net/2019/11/14/openid-connect-for-identity-assurance/</link>
<pubDate>Thu, 14 Nov 2019 12:58:35 +0000</pubDate>
<dc:creator><![CDATA[Mike Leszcz]]></dc:creator>
<category><![CDATA[Foundation]]></category>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[eKYC]]></category>
<category><![CDATA[Identity Assurance]]></category>
<category><![CDATA[Torsten Lodderstedt]]></category>

<guid isPermaLink="false">http://openid.net/?p=34876</guid>
<description><![CDATA[This week the OpenID Foundation announced the approval of the Implementer’s Draft of the OpenID Connect for Identity Assurance specification. This new specification is a product of the OpenID Connect Working group. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. The global adoption of OpenID [...]]]></description>
<content:encoded><![CDATA[<p>This week the OpenID Foundation <a href="https://openid.net/2019/11/11/implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/">announced the approval of the Implementer’s Draft of the OpenID Connect for Identity Assurance specification</a>. This new specification is a product of the <a href="https://openid.net/wg/connect/">OpenID Connect Working group</a>. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification.</p>
<p>The global adoption of OpenID Connect is demonstrated in the many profiles it has generated. OpenID Connect’s value is seen the range of use cases it serves and its impact on the privacy, security, and ease of use it delivers to end users. As its global adoption grows, OpenID Connect is increasingly being used in scenarios requiring higher identity assurance levels. Some examples include:</p>
<ul>
<li>Anti-Money Laundering</li>
<li>Telecommunications</li>
<li>eGovernment</li>
<li>Access to Health Data</li>
<li>Risk mitigation</li>
<li>Fraud prevention</li>
</ul>
<p>One can observe that current implementations often rely on implicit attestation of the verification status of the data provided based on the context the relying party (RP) and the trust framework the IDP has joined. Implicit attestation may cause ambiguity. For example, what claims in result set are verified and which are not? As a further challenge, the RP lacks metadata and evidence needed for mapping between regulatory/legal contexts, dispute resolution, and auditing.</p>
<p>The new <a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0.html">OpenID Connect for Identity Assurance specification</a> defines a representation for verified claims and associated metadata and evidence while enabling legal compliance for the aforementioned use cases. This specification provides important support for explicit attestation in a trust framework wherein the identity provider can supply:</p>
<ul>
<li>Time of verification</li>
<li>Verifier: what party verified the user&#8217;s identity</li>
<li>Evidence: which evidence where used</li>
<li>Verification Method: how were the evidence verified</li>
</ul>
<p>The specification advances solutions for privacy wherein the RP asks for individual claims and verification data elements. This makes clear that the purpose of inquiry can be conveyed per transaction or individual claim.</p>
<p>This effort is intentionally and importantly internationally driven and benefits from contributions from the UK, US, CA, DE, and JP. The specification includes (growing number) of pre-defined identifiers for:</p>
<ul>
<li>Trust frameworks, e.g., eIDAS, NIST 800-63A, Japanese and German AML</li>
<li>Identity documents, e.g., ID Card, Passport, Driving Permit</li>
<li>Verification Methods, e.g., „“Physical In-Person Proofing” and “Supervised remote In-Person Proofing”</li>
</ul>
<p>The Foundation plans to start a new working group dedicated to eKYC and Identity Assurance. The working group’s charter has roots in contributions from the UK, US, CA, DE, and JP. We would benefit from an even broader group of participants to build on the initial contributions drawing from Torsten Lodderstedt’s domain expertise and experience at yes.com.</p>
<p>Finally thanks to Torsten, on behalf of the Foundation and community, for advancing this important specification. Bravo Torsten!</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
]]></content:encoded>
</item>
<item>
<title>Implementer’s Draft of OpenID Connect for Identity Assurance Specification Approved</title>
<link>https://openid.net/2019/11/11/implementers-draft-of-openid-connect-for-identity-assurance-specification-approved/</link>
<pubDate>Mon, 11 Nov 2019 20:02:10 +0000</pubDate>
<dc:creator><![CDATA[Mike Jones]]></dc:creator>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[Identity Assurance]]></category>
<category><![CDATA[specification]]></category>
<category><![CDATA[vote]]></category>

<guid isPermaLink="false">http://openid.net/?p=34858</guid>
<description><![CDATA[The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect for Identity Assurance 1.0 An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This is the first Implementer’s Draft of this specification. This specification is a product of the [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft:</p>
<ul>
<li><a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0-08.html">OpenID Connect for Identity Assurance 1.0</a></li>
</ul>
<p>An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification.  This is the first Implementer’s Draft of this specification.  This specification is a product of the <a href="https://openid.net/wg/connect/">OpenID Connect Working group</a>.</p>
<p>The Implementer’s Draft is available at:</p>
<ul>
<li><a href="https://openid.net/specs/openid-connect-4-identity-assurance-1_0-ID1.html">https://openid.net/specs/openid-connect-4-identity-assurance-1_0-ID1.html</a></li>
</ul>
<p>The voting results were:</p>
<ul>
<li>Approve &#8211; 47 votes</li>
<li>Object &#8211; 1 votes</li>
<li>Abstain &#8211; 0 votes</li>
</ul>
<p>Total votes: 48 (out of 231 members = 21% > 20% quorum requirement)</p>
<p>&#8212; Michael B. Jones – OpenID Foundation Board Secretary</p>
]]></content:encoded>
</item>
<item>
<title>Dispatch from Innotribe@Sibos 2019</title>
<link>https://openid.net/2019/11/11/dispatch-from-innotribesibos-2019/</link>
<pubDate>Mon, 11 Nov 2019 15:01:35 +0000</pubDate>
<dc:creator><![CDATA[Don Thibeau]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[2019]]></category>
<category><![CDATA[Don Thibeau]]></category>
<category><![CDATA[fintech]]></category>
<category><![CDATA[identity custodian]]></category>
<category><![CDATA[identity standards]]></category>
<category><![CDATA[innotribe]]></category>
<category><![CDATA[open banking]]></category>
<category><![CDATA[sibos]]></category>

<guid isPermaLink="false">http://openid.net/?p=34852</guid>
<description><![CDATA[Innotribe is always a dynamic and thought-provoking opportunity for voices from outside the finance industry to collaborate at Sibos. At this years Sibos-2019-London, I led a panel discussion of fintech and identity experts to exchange experiences and discuss opportunities as we develop and implement community-driven, open standards for digital identity and global open banking initiatives. [...]]]></description>
<content:encoded><![CDATA[<p><img class=" wp-image-34856 alignright" src="http://openid.net/wordpress-content/uploads/2019/11/S1-300x200.png" alt="" width="239" height="159" srcset="https://openid.net/wordpress-content/uploads/2019/11/S1-300x200.png 300w, https://openid.net/wordpress-content/uploads/2019/11/S1.png 488w" sizes="(max-width: 239px) 100vw, 239px" />Innotribe is always a dynamic and thought-provoking opportunity for voices from outside the finance industry to collaborate at Sibos. At this years Sibos-2019-London, I led a panel discussion of fintech and identity experts to exchange experiences and discuss opportunities as we develop and implement community-driven, open standards for digital identity and global open banking initiatives.</p>
<p>There was consensus that existing identity standards need to be utilized to ensure the identity portable and accessible across many trust frameworks. But we still have to work out how we share data among all the actors including relying parties and intermediaries. And we have to ask how we accept data shared with us? What does trust mean for others? How do we interpret their trust score? How can self-certification help drive trust?</p>
<p>In addition to the fintech solutions and open standards discussions, there is a natural extension of that conversation addressing the consumer and the consumer experience. I also co-presented with Eric Sachs from the Microsoft Identity Team providing a retrospective of the consumer payments space and the consumer login space evolution for managing digital identity.</p>
<p><img class=" wp-image-34855 alignleft" src="http://openid.net/wordpress-content/uploads/2019/11/S2-300x200.png" alt="" width="254" height="169" srcset="https://openid.net/wordpress-content/uploads/2019/11/S2-300x200.png 300w, https://openid.net/wordpress-content/uploads/2019/11/S2.png 444w" sizes="(max-width: 254px) 100vw, 254px" />As social login evolves to support higher-assurance interactions, there is much to learn from the fintech experience. For example, fintech solutions are designed and implemented to deliver high-assurance financial services while social login through social media relies on low-assurance mechanisms. That being said, the identity community has used mobile devices and solution to improve both the usability and security of consumer login.</p>
<p>In the current environment, we find the fintech space has had success with ongoing innovation to offer more choices to users for how to pay for things while improving security and usability and leveraging global standards. Unfortunately the same cannot be said of the current consumer login landscape. There are few choices with most solutions still relying on mostly passwords and fewer examples of those improving security and usability.</p>
<p>The FIDO key standard continues to be at the forefront of discussions around consumer solutions as FIDO (Fast ID Online) is used with portable security keys. While FIDO keys actually end up raising the security bar so high that it is not clear how to help consumers recover their account if they lose the keys. There is still a lot of work to be done with respect to keys and consumer solutions.</p>
<p><img class=" wp-image-34854 alignright" src="http://openid.net/wordpress-content/uploads/2019/11/S3.png" alt="" width="204" height="179" />An innovation and topic that was highlighted at Sibos is the idea of creating identity custodians. An identity custodian could potentially be a positive force for both identity providers and consumers alike. One of the visions is that browsers and operating systems will allow consumers to install these identity custodians just as they install password managers. This would provide the consumer more control of their digital identity and associated attributes. It would allow solution providers to then develop solutions focused on the consumer while leveraging robust, standard based identity solutions already implemented by identity providers.</p>
<p>Important takeaways from our presentation are that “consumer choice” continues to drive digital identity innovation and an opportunity for increasing collaboration between financial services and mobile network operators providing identity services.</p>
<p>Progress is being made, but it is slow. There is positive light in the crossroads of enhanced consumer solutions and identity solutions that are on the horizon underpinned by established, standards-based identity services. And there is a sense of encouragement in the community about the potential convergence of innovative fintech solutions and MNO-based identity services that will continue to drive an increasing mobile world. Interesting times ahead.</p>
<p>&nbsp;</p>
<p>Don Thibeau<br />
OpenID Foundation Executive Director</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
</item>
<item>
<title>Second Public Review Period for OpenID Connect Federation Specification Started</title>
<link>https://openid.net/2019/11/07/second-public-review-period-for-openid-connect-federation-specification-started/</link>
<pubDate>Thu, 07 Nov 2019 18:00:51 +0000</pubDate>
<dc:creator><![CDATA[Mike Jones]]></dc:creator>
<category><![CDATA[News]]></category>
<category><![CDATA[OpenID Connect]]></category>
<category><![CDATA[Specs]]></category>
<category><![CDATA[Working Group]]></category>
<category><![CDATA[federation]]></category>
<category><![CDATA[Implementer's Draft]]></category>
<category><![CDATA[Public Review]]></category>
<category><![CDATA[specification]]></category>
<category><![CDATA[vote]]></category>

<guid isPermaLink="false">http://openid.net/?p=34844</guid>
<description><![CDATA[The OpenID OpenID Connect Working Group recommends approval of the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0 This would be the second Implementer’s Draft of this specification. An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day [...]]]></description>
<content:encoded><![CDATA[<p>The OpenID <a href="https://openid.net/wg/connect/">OpenID Connect Working Group</a> recommends approval of the following specification as an OpenID Implementer’s Draft:</p>
<ul>
<li><a href="https://openid.net/specs/openid-connect-federation-1_0-10.html">OpenID Connect Federation 1.0</a></li>
</ul>
<p>This would be the second Implementer’s Draft of this specification.</p>
<p>An Implementer’s Draft is a stable version of a specification providing intellectual property protections to implementers of the specification. This note starts the 45-day public review period for the specification draft in accordance with the OpenID Foundation IPR policies and procedures. Unless issues are identified during the review that the working group believes must be addressed by revising the draft, this review period will be followed by a seven-day voting period during which OpenID Foundation members will vote on whether to approve this draft as an OpenID Implementer’s Draft. For the convenience of members, voting will actually begin a week before the start of the official voting period and run for an extra week because of the holidays.</p>
<p>The relevant dates are:</p>
<ul>
<li>Implementer&#8217;s Draft public review period: Thursday, November 7, 2019 to Sunday, December 22, 2019 (45 days)</li>
<li>Implementer&#8217;s Draft vote announcement: Monday, December 9, 2019</li>
<li>Implementer&#8217;s Draft voting period: Monday, December 16, 2019 to Tuesday, January 7, 2020 *</li>
</ul>
<p>* Note: Early voting before the start of the formal voting period will be allowed.</p>
<p>The OpenID Connect working group page is <a href="https://openid.net/wg/connect/">https://openid.net/wg/connect/</a>.  Information on joining the OpenID Foundation can be found at <a href="https://openid.net/foundation/members/registration">https://openid.net/foundation/members/registration</a>.  If you’re not a current OpenID Foundation member, please consider joining to participate in the approval vote.</p>
<p>You can send feedback on the specification in a way that enables the working group to act upon it by (1) signing the contribution agreement at <a href="https://openid.net/intellectual-property/">https://openid.net/intellectual-property/</a> to join the working group (please specify that you are joining the “AB/Connect” working group on your contribution agreement), (2) joining the working group mailing list at <a href="https://lists.openid.net/mailman/listinfo/openid-specs-ab">https://lists.openid.net/mailman/listinfo/openid-specs-ab</a>, and (3) sending your feedback to the list.</p>
<p>— Michael B. Jones – OpenID Foundation Board Secretary</p>
]]></content:encoded>
</item>
</channel>
</rss>

Services Rendered

subdomain | daily visitors | fraction google.com | 2261290000 | 41.05% mail.google.com | 858627000 | 15.59% docs.google.com | 462496000 |...