1 / 18

The LASSeO workshop Geoff Doggett & Mick Davies

The LASSeO workshop Geoff Doggett & Mick Davies. For each application:. we should consider: Roles to be adopted by card users Characteristics of technology required Possible technology solutions Appropriate standards/specs. Roles to be adopted by card users. Employee

donal
Download Presentation

The LASSeO workshop Geoff Doggett & Mick Davies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The LASSeO workshopGeoff Doggett & Mick Davies

  2. For each application: we should consider: • Roles to be adopted by card users • Characteristics of technology required • Possible technology solutions • Appropriate standards/specs

  3. Roles to be adopted by card users • Employee • Citizen wanting a card for voluntary service access (pull) • Citizen Needing a card to ease critical service access (push) • Personal use • Business to Government use • Combinations • Accessibility enhancement (eg personalisation, DDA etc) • Child • Student • Third age

  4. Characteristics of technology • Transaction speed • Functionality • Flexibility • Service level • Certificates • Robustness • Security levels • Post issuance update

  5. Possible technology solutions • Memory cards • Processor cards • Contactless i/f • Contact i/f • Mobile device • Other technologies • Strong ID/weak ID/Pseudonymity/Anonymity

  6. Appropriate standards/specs • ITSO • EMV • SCNF Mifare • Oyster • Info security • etc

  7. I suggest that we pick the most popular and work through them one by one • To see how the process works • To see if it helps to draw out any messages • About technology features required • About the roles of people affected • About the strength of security required • And anything else you can come up with

More Related