
The analysis doc is here <https://docs.google.com/document/d/1lJXDFzlq8j-m0f8mELjqYcX6PPcYSjOuxiGHzwU7dDE/edit?usp=sharing> (and was linked in the meeting minutes contained in the message where I asked for solution proposers to present). The goal is to see how solutions stack up to the challenges presented. In this case, the challenges of "no assumption of any particular trusted federation" and, I imagine, also "Bob's experience" would be relevant. (I'd observe that one way existing smart doorbell systems handle the dynamics of a totally unknown person showing up is that Alice herself checks the "requesting party" and the latter doesn't have a client at all -- they present their face as a sort of "claim", and Alice can synchronously choose to unlock the door. Not sure how/whether to map this use case directly, vs. someone wielding an actual client.) *Eve Maler*Cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl On Tue, Apr 12, 2016 at 5:33 AM, Adrian Gropper <agropper@healthurl.com> wrote:
John,
#wideeco requires 6 things: - low cost - limited or no connectivity - no assumption about Bob's client - no assumption that Bob has pre-registered - no assumption of any particular trusted federation - no assumption that the RS and AS are anything but generic UMA
All of these constraints together make for a bad user experience under any circumstances with or without technology. Shared door locks are no joy today when the apartment doesn't have a wired telephone line, or when the doors require Bob to have a $40 fob.
The user experience improves as we remove some or all of the 6 constraints. As far as QR codes and password less authentication, I don't think that's something we need to deal with in UMA.
Adrian
On Tuesday, April 12, 2016, John Wunderlich <john@wunderlich.ca> wrote:
Adrian;
This is a process for early adopters at best. Steps 1 through 9 sound like what early car enthusiasts had to go through to start a car: Magneto, Switch, Contact, Prime gas,…Crank the engine. If it doesn’t start return to the beginning. Cars still effectively do most of this, but it has been automated and put out of sight. I’m a geek and I find the process you outlined daunting. Until the process is as easy as putting a key in the lock and opening the door, it’s unlikely to have mass appeal.
The big question for me is how to move the steps you’ve outlined out of band to something that is easier than what we currently do. For example - why can’t the building display a QR Code that Bob can scan with his phone. His phone is his authentication, and the QR code validates that he’s in front of the building.
Sincerely, John Wunderlich @PrivacyCDN
Call: +1 (647) 669-4749 eMail: john@wunderlich.ca
On 12 April 2016 at 18:24, Adrian Gropper <agropper@healthurl.com> wrote:
Here's how a shared door lock would work today:
Step 1: Bob approaches the shared door and sees a sign telling him how to access the building directory 2: Bob connects his phone to the local wi-fi access point 3: Bob types the URL of the building directory into his browser - the door lock RS serves up a directory page 4: Bob clicks Alice's link in the RS directory page - is redirected to Alice's AS 5: Alice's AS challenges Bob somehow - it could be that Bob has to enter his cell phone number, or open a WebRTC call with Alice - whatever 6: Alice thinks up an access PIN for Bob - enters Bob's cell phone number and PIN into her AS 7: Alice tells Bob the PIN - however she does that 8: Bob enters the cell phone number and PIN into the AS 9: The RS opens the door
Case A (LAN only): The sequence above mirrors what happens today when Bob talks to Alice and is "buzzed-in". The only difference is that Alice must sign-in to her AS to enter a phone number and PIN and Bob must enter the same two things into the AS. This is not a great user experience but it is needed because we took away the proprietary buzzer connecting Alice to the lock. The benefit is that Alice can decide when Bob's PIN must expire.
Case B: Add a WAN connection and an IDP that might or might not be trusted. Alice's AS asks Bob for his IDP and name https://onename.com/agropper . Alice's AS either accepts Bob's attributes automatically or it sends a text message to Alice with the link. Alice replies to the text message with yes and an optional expiration date.
I'm not sure what the challenge analysis document is.
Adrian
On Sunday, April 10, 2016, Eve Maler <eve@xmlgrrl.com> wrote:
Adrian, so far this looks like a use case (and an interesting IoT use case at that) -- but not quite a solution description, in that we don't know if it actually resolves #wideeco problems we've identified. E.g., the mechanism of providing claims works great in narrow and medium ecosystems already, but it seems to break down in wide ecosystems for various reasons.
Can you please start a new thread, and also be sure to describe which challenges in the challenge analysis document (and/or any other new challenges not previously discussed) your solution purports to solve? It's perhaps also worth noting that there are smart door looks and doorbell products on the market, if not ones with UMA capabilities; can we learn from what they do now?
(We'll probably want a new thread per solution area.)
*Eve Maler*Cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl
On Sat, Apr 9, 2016 at 2:07 PM, Adrian Gropper <agropper@healthurl.com> wrote:
AI for discussion: Different patterns of Alice's AS and RS's accepting and providing federated logins? (Adrian)
I would like to champion a #wideeco solution called "A Lock to Alice's Shared Door" as follows:
- The RS is an IoT lock on the shared door of a multi-unit condo. - The lock has to work even if disconnected from the internet. - Alice has her own AS in her own condo. - Alice has to be able to unlock the shared door even if disconnected from the internet. - Alice carries a smartphone that can connect to the RS and AS locally and via the internet. - Bob is a guest that wants to access the shared door based on Alice's AS policies. - Bob carries a smartphone that can connect to the RS and AS locally and via the internet. - The shared door RS and Alice's AS are each built on standard commodities that include a typical secure element. - e.g.: https://www.arduino.cc/en/Main/ArduinoMKR1000 including http://www.atmel.com/products/security-ics/cryptoauthentication/ecc-256.aspx - Bob can present claims to Alice's AS: 1. by referencing a personal certificate previously stored in the AS (e.g.: using PGP, a FIDO key, or equivalent) 2. by contacting Alice out-of-band for a one-time credential into her AS 3. by authenticating to the RS (assuming the RS has been configured as an IdP and is trusted by the AS) 4. by authenticating to an IdP (assuming the internet is working and the IdP is trusted by the AS) 5. by authenticating to a blockchain persona like https://medium.com/@ConsenSys/uport-the-wallet-is-the-new-browser-b133a83fe7... this could involve a camera and face recognition as in http://www.planetbiometrics.com/article-details/i/4238/desc/google-trialling... 6. by following a claims gathering process directed by Alice's AS
I believe these 6 are the only distinct categories and I would hope that Alice's AS supports all of them if Alice is willing to take the time to configure them. Within each category, there will be various user experiences depending on what kind of technology Bob has in his pocket.
Adrian
On Fri, Apr 8, 2016 at 4:40 PM, Eve Maler <eve@xmlgrrl.com> wrote:
I've also done a little bit of suggested reordering of the roadmap <http://kantarainitiative.org/confluence/display/uma/UMA+Roadmap+for+2016> priorities to account for the appearance of so many use case buckets in the first bullet in the list, and other realities; please see what you think. Essentially, we can't really consider Justin's proposals for #wideeco without also considering their #simplify impact, and some of their #IoT impact, but some other #IoT analysis will have to wait a bit longer. Also, we don't have any #security work on our docket at the moment, but more could arise at any time, and there's some constant legal-subgroup work being done. Etc.
Oh, and I've put the named people who I hope will take on action items directly on the cc list this time, to draw their attention to my request.
Happy Friday! :-)
*Eve Maler*Cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl
On Fri, Apr 8, 2016 at 9:52 AM, Eve Maler <eve@xmlgrrl.com> wrote:
> Hi all-- The agenda for our call yesterday tried to summarize what I > think is the most up-to-date list of ideas I've heard so far: > > > - Examining solutions for wide ecosystem challenges (Eve's > challenge analysis doc > <https://docs.google.com/document/d/1lJXDFzlq8j-m0f8mELjqYcX6PPcYSjOuxiGHzwU7dDE/edit?usp=sharing>) – > look at: > - UMA-protected UserInfo? (various) *[Mike]* > - Different patterns of Alice's AS and RS's accepting and > providing federated logins? (Adrian) > - "Multi-party" proposal? (Justin) (engages with #APIsec and > #simplify use case buckets too) *[also #IoT as discussed on > Thursday]* > - AS requests claims and client does act_as Bob to send them? > (Mike, James) > - Alice's AS dynamically gets client credentials to Bob's > claim sources? (various) *[Eve]* > - Meta-suggestion: Should trust elevation methods be > modularized? (James) > - Others? > > > Can the people identified above please take action items to present > at upcoming calls? If you're not clear on what this is about, or if you > can't do this action, please let me know. Thanks! > > And remember, we've got some upcoming "holes" in our Q2 WG meeting > schedule. I've just deleted some of our Thursday meetings (Fridays haven't > been impacted yet), with possibly a couple more to come. We've got some > exciting work coming up, so let's try to press ahead with offline prep such > as this. > > > *Eve Maler*Cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl > >
--
Adrian Gropper MD
PROTECT YOUR FUTURE - RESTORE Health Privacy! HELP us fight for the right to control personal health data. DONATE: http://patientprivacyrights.org/donate-2/
_______________________________________________ WG-UMA mailing list WG-UMA@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/wg-uma
This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.
--
Adrian Gropper MD
PROTECT YOUR FUTURE - RESTORE Health Privacy! HELP us fight for the right to control personal health data. DONATE: http://patientprivacyrights.org/donate-2/