Truemag

  • Subscribe
    • New Subscription
    • Account Updates
    • Customer Service
  • News & Events
    • News
    • Events
  • Advertise
    • Media Kit
    • Reprints
    • Contacts
  • Editorial
    • Podcasts
    • Current Articles
    • Digital Editions
    • eNewsletter
    • Editor’s Desk
    • Edit Calendar
    • Contacts
  • Buyers Guide
    • Search
    • Sponsor Index
    • Vendor Update
  • Annual Software Ranking
    • Ranking Form
    • Annual Software Ranking
    • 2018 Software Ranking File Package

New IBM Cloud Tool Eliminates the Need for Users to Share Personal Data with Apps

11.20.2015

IBM (NYSE: IBM) Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud.

Accessible to developers on Bluemix, IBM’s Cloud platform, Identity Mixer is built on years of cryptography research, and holds the key to helping to reduce identity theft happening as the result of sharing personal data on mobile and web apps. Using algorithms, the tool allows developers to build apps which can authenticate users’ identities without collecting personal data, otherwise known as a “zero-knowledge proof”.

For example, consider an online streaming movie service app which requires users to verify that they have a paid subscription and that they are not a minor. Traditionally, the user would enter in his or her full date of birth, along with a number of other personal details which aren’t necessary, such as first and last name, location, etc.

Using Identity Mixer, however, the app can simply verify the authenticity of the user’s claims of being above a certain age and having a subscription – without having to collect any other details or to interact. Because no other personally identifiable data is exchanged, companies do not have the burden of protecting and securing this data, and users no longer have the risk of their data being exposed to malicious third parties.

Built by scientists at IBM’s Research facilities in Zurich, Switzerland, Identity Mixer authenticates users by asking them to provide a public key. Each user has a single secret key which corresponds with multiple public keys, or identities. Each transaction a user makes receives a different public key and leaves no privacy “breadcrumbs.”

For more information on IBM Identity Mixer, view a short video or visit https://idemixdemo.mybluemix.net/. Follow the conversation on Twitter using #identitymixer.

IBM.com

Nov 20, 2005Courtney Saba
Panda Security Reveals Cyberattacks Aimed at Public Organizations Around the WorldExpanding Options with Ethernet
Product Centrics
TrueNAS Open Source Storage Platform brings Full Windows ACL Support to Linux

Fully featured Windows file system ACLs are well supported in TrueNAS 12.0 (CORE and Enterprise), but not generally supported by Linux. Thanks to some innovation, and sweat from the iXsystems engineering team, TrueNAS SCALE 21.08...

Driving Successful Digital Transformation Initiatives in 2022

Well, the end of the year is the perfect time to reflect on all the past year's activities and plan for the coming year. As we plan for 2022, one thing...

Recovery Platforms

Established in 2013, Imanis Data, previously Talena...

Data Driven Efficiency

Founded in 2003, Tableau is a public software company...

Updated Hitachi CRM

Building Product Manufacturers (BPM) require...

Quick Links
Untitled Document
SW500 SW500 SW500 SW500 SW500
2022 © Rockport Custom Publishing, LLC