Part of the Network security glossary:

OneID is a digital identity management service that provides a repository for usernames and passwords, eliminating the need for people to remember numerous arcane character sequences. OneID was founded by Steve Kirsch, a Silicon Valley entrepreneur and inventor, with the idea of replacing the prevailing username/password model with an approach that takes advantage of public key cryptography. The system can run in browsers, Web sites, cellular telephones, tablet PCs, mobile Internet devices, and the cloud.

OneID can reduce costs and pressure on businesses by enhancing security and streamlining customer service. The system eliminates the need for Web sites to store credit card information or other sensitive personal data, thereby reducing site owners' liability. User data is stored on the user's own devices so the information has minimal risk of exposure if a central security breach occurs. OneID employs a two-factor authentication system that places users in direct and constant control of their personal, financial and credit card information. Users can choose the level of security they want for each type of transaction.

 

Continue reading about OneID:

Fast Company announced the launch of OneID on March 13, 2012.

CrunchBase outlines the basic features of OneID.

See the OneID Web site for status updates.

This was last updated in April 2012
Contributor(s): Stan Gibilisco
Posted by: Margaret Rouse

Related Terms

Definitions

  • GPS tracking

    - GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitu... (WhatIs.com)

  • due diligence

    - Due diligence is the process of systematically researching and verifying the accuracy of a statement. The term originated in the business world, where due diligence is required to validate financia... (WhatIs.com)

  • passive scanning

    - Passive scanning is a method of vulnerability detection that relies on information gleaned from network data that is captured from a target computer without direct interaction. (WhatIs.com)

Glossaries

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • Was this facebook account hacked?

    When I was first going to school for my bachelors, I was given a reused ID (they recycle after 6 months after graduation).  The person before me decided to sign up to FB with that email.I post...

  • Data purging in AS/400

    I believe its a VDU Program right?The easiest approach would be a CL Program as a middle layer which will help to override file from archiev library.  This CL Program to be called only when th...

  • Adding OBJECT to the user in SAP ID

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.