Part of the Network security glossary:

OneID is a digital identity management service that provides a repository for usernames and passwords, eliminating the need for people to remember numerous arcane character sequences. OneID was founded by Steve Kirsch, a Silicon Valley entrepreneur and inventor, with the idea of replacing the prevailing username/password model with an approach that takes advantage of public key cryptography. The system can run in browsers, Web sites, cellular telephones, tablet PCs, mobile Internet devices, and the cloud.

OneID can reduce costs and pressure on businesses by enhancing security and streamlining customer service. The system eliminates the need for Web sites to store credit card information or other sensitive personal data, thereby reducing site owners' liability. User data is stored on the user's own devices so the information has minimal risk of exposure if a central security breach occurs. OneID employs a two-factor authentication system that places users in direct and constant control of their personal, financial and credit card information. Users can choose the level of security they want for each type of transaction.

 

Continue reading about OneID:

Fast Company announced the launch of OneID on March 13, 2012.

CrunchBase outlines the basic features of OneID.

See the OneID Web site for status updates.

This was last updated in April 2012
Contributor(s): Stan Gibilisco
Posted by: Margaret Rouse

Related Terms

Definitions

  • passive scanning

    - Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction. (WhatIs.com)

  • active attack

    - An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. In a masquerade attack, for example, the intruder pretends to ... (WhatIs.com)

  • passive attack

    - A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data ... (WhatIs.com)

Glossaries

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • Was this facebook account hacked?

    Have her run a virus scan on her PC. Sounds like she may have some malware like a key logger. This would send anything she types to the author and they now have her ID / password. Best bet is have ...

  • Data purging in AS/400

    I believe its a VDU Program right?The easiest approach would be a CL Program as a middle layer which will help to override file from archiev library.  This CL Program to be called only when th...

  • Adding OBJECT to the user in SAP ID

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.