INDEX

Standards and Initiatives for Secure Identity

Various efforts are underway in the creation of national/international standards and initiatives for identity within the government ID market. Not all are targeted at the same market segment or region, but a clear calling and emphasis has been placed on the creation of interoperable standards to bring further transparency and continuity to identities, whether tied to a physical smart card credential, mobile device or digital online identity to ensure secure transactions.

Efforts including STORK 2.0, NSTIC, Open ID, Real ID, ICAO, FIPs, FIDO Alliance, and the GSMA are just a few examples of initiatives and standards focused on defining ecosystems, identification security, and possible market convergence.

This report provide ABI Research’s analysis of the current and future market for identity standards and initiatives, the likely outcome of the most significant identity related initiatives and standards, timeline to realization and potential for use cases across multiple regions and market segments.

Table of Contents

  • 1. IDENTITY STANDARDS AND INITIATIVES MARKET LANDSCAPE, INTRODUCTION, AND EXECUTIVE SUMMARY
    • 1.1. Introduction and Report Scope
      • 1.1.1. The Current Market Landscape of Identity Standards and Initiatives
    • 1.2. Executive Summary
  • 2. SECURING IDENTITIES: STANDARDS AND INITIATIVES OVERVIEW/ ANALYSIS
    • 2.1. Significant Standards and Initiatives in Question
      • 2.1.1. STORK 2.0 Introduction
      • 2.1.2. Analysis of STORK 2.0
      • 2.1.3. ICAO Introduction
      • 2.1.4. Analysis of ICAO
      • 2.1.5. EMV Introduction
      • 2.1.6. Analysis of EMV
      • 2.1.7. Open ID Introduction
      • 2.1.8. Analysis of Open ID
      • 2.1.9. Real ID
      • 2.1.10. Analysis of Real ID
      • 2.1.11. NSTIC
      • 2.1.12. Analysis of NSTIC
      • 2.1.13. FIPS
      • 2.1.14. Analysis of FIPS
      • 2.1.15. FIDO Alliance
      • 2.1.16. Analysis of FIDO Alliance
      • 2.1.17. Trusted Computing Group
      • 2.1.18. Trusted Computing Group Analysis
      • 2.1.19. Secure Identity Alliance
      • 2.1.20. Secure Identity Alliance Analysis
      • 2.1.21. Common Criteria
      • 2.1.22. Common Criteria Analysis
      • 2.1.23. GSMA Introduction
      • 2.1.24. GSMA Analysis
      • 2.1.25. A Closer Look at the Standards in Question
  • 3. STANDARD AND INITIATIVE DEVELOPMENT CRITICAL FOR THE FUTURE OF SECURING IDENTITIES
    • 3.1. Use of Physical Smart Credentials to Secure and Authenticate Identities Cross-border
    • 3.2. Leveraging Existing and Proven Standards
    • 3.3. Regulations Driving Standards or Not?
    • 3.4. Initiatives Set Up to Provide the Identity Interoperability That Standards Have Failed
    • 3.5. Securing Identities Outside of Government ID Applications
    • 3.6. Drivers Standards and Initiatives Adoption within the Government ID Market
    • 3.7. Standards and Initiatives: The Pain Points
    • 3.8. Strategic Recommendations in Identity Standards and Initiatives Development

Tables

  1. STORK 2.0 Project List
  2. NSTIC Project List
  3. Identity Standards Comparison
  4. Installed Base of Smart Government ID Credentials by Application, World Market, Forecast: 2012 to 2018

Figures

  1. Standards and Initiatives Matrix