The identity management

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

1. Abstract

The identity management is one of the biggest issues which most of the organisations facing issues. In which one of them is Metropolitan Police Service (MPS). They have also fallen into the net of single sign on requirement. Unlike other organisation the MPS has very critical and sensitive data to access and manage with. Most of the staff members like to access the data through wireless medium to deal with the case more effectively. As the growing crime rate in United Kingdom more n more sophisticated equipment are required in which accessing the database server in a remote location of the UK is vital. The MPS is trying to conduct a study on "Trust" with respect to technology used to securely and safely access information on the network.

2. Introduction

The case study would talk about most of the problems faced by the organisation and their overcome with respect to network infrastructure and creating a secured environment to tackle with complexity of the network. Multiple digital identities and biological identities are one of the challenging areas of the MPS and trying to find more complex issues that can threat the secured way of communicating among wireless devices on the network using client -server architecture technology. The MPS is described as one of the largest police force in UK and has taken the responsibility of securing the seven million residents. It has a work force of 30000 staff and 15000 community police officers and 5000 contract employees to assist the actual staff. They have installed some of the servers that assist in multiple digital identities like Siemens leading LDAP/X.500 directory server DirX. This would assist them to maintain the entire database under one roof.

3. Task 1

In present world of technology were most of the information is shared on the common platform called WWW (World Wide Web). There are other additional technologies which are introduced to create a protective environment in sharing on the Internet. Today's world the internet has become an essential part of the human life and without Internet most of the world's population becomes paralysed. Safe guarding such an environment is one of the top challenges of today's engineers. There are so many website a user gets registered with and remembering all those logins is a challenge. Creating a same login is not possible for most of the application depending on the availability of the user name on their respective database. Creating same login to all the application is again a breach in the security problem.

The similar problems are being faced by the MPS and now it is trying to find a common solution which can save time and energy to most of their staff. However they are managed to get the entire database under one roof using the Siemens X.500/LDAP directory technology. But getting the single sign on for all that application is a challenge. To effectively utilize the staff potential and economic resource we need to get the single sign on technology and help the staff to protect the residents of UK.

4. Task 2

To strength the user authentication we could think of different types of login process like password entry. In password entry we two types one as character input and Visual password. In character input password method we should create a password length of 10-13 min, in which 1 uppercase, 1 special character and min three numbers and password strength indicator to inform the user. We could also combine the character password with respect to visual password to strength the security.

Based on the different level s of access information within the organisation and based on data accessibility we shall introduce biological identity. In today's security issues has created the need to introduce the biological identity in conjunction to conventional password pattern.

There are different types of biological identity like:

  • Fingerprint
  • Retina
  • Hand recognition
  • Voice recognition etc

I shall discuss two important biological identities which would be recommended to use as authentication process at workstation level.

4.1 Palm recognition:

The pattern of blood veins is unique to every individual, even among identical twins. Palms have a broad and complicated vascular pattern and thus contain a wealth of differentiating features for personal identification. Furthermore, it will not vary during the person's lifetime.

An individual's vein pattern image is captures by radiating his/her hand with near-infrared rays. The deoxidised haemoglobin in the vein vessels absorbs the infrared ray, thereby reducing the reflection rate and causing the veins to appear as a black pattern. This pattern is verified against the preregistered pattern to authenticate.


  • Difficult to forge
  • Contactless, hygienic and non-invasive
  • Highly accurate
  • Capable of 1:1 and 1:many matching


  • Security systems: physical admission into secured areas with door lock and integrated building security systems
  • Log-in control: network or PC access
  • Healthcare: ID verification for medical equipment, electronic record management
  • Banking and financial services: access to ATM, kiosks, vault

4.2 Iris and Retina Recognition:

It is yet another feature that is being widely recognised and accepted as one of the security systems.

  • Based on visible features, i.e. rings, furrows, freckles and the corona
  • Iris essentially formed by 8 months of age and remains stable through life
  • Each iris has 266 unique spots vs. 13-60 for other biometrics
  • Features and their location are used to form the IrisCodeT, which is the digital template (512 bytes)


  • No false acceptance identified
  • It is non intrusive and hygiene as no physical contact required to the scanning device


During the process of scanning the user is advice to stand still.


Smart cards, login to high security building.

5. Task 3

The two main distinguishing features of biological and multiple digital identities are in biological the person should be present physically to get the access to the system in digital identities the user can enter the password which represents in character form to login to the systems. To explain in much simple term the digital identification is an online representation of an individual and is protected from others. The digital identification should be protected carefully and should not be shared with colleges or any other person within the family members. It should be purely personal.

In digital identities there are two types

  1. Professional
  2. Private

The biological identification could be a process of scanning the human organ over a scanner to identify oneself over others. The biological identity could be in different forms like Finger print reader, Iris scanner, Hand recognition, voice recognition etc.

6. Task 4

Secure messaging within the MPS is very critical as lot of important information floats through the wireless environment and there are constantly being tried to tamper with various available means and having secured infrastructure is most essential part of such organisation. The closet hacker would be some of the internal staff who can leak lot of information to the unreliable source.

In PKI technology it uses two types of access before any person get hold of the accessible data. Which are public and private key? Everyone can see the public key but only few authorized people gain access to the data with the private key. In PKI the algorithm used is RSA and it is accepted by the corporate world based on the recommended usage it is advised as one of the reliable source of secure messaging for the MPS staff. Using the secured wireless environment the staff members can access the data from the crime scene to fight against the crime effectively and help to prevent any further incidents by sharing the same data on a common platform.

PKI is known as service product and manage X.509 certificate for public key cryptography. The certificates identify the individual named certificate and bind the person to a particular public/private key pair. While we are discussing about the single sign on (SSO) over multiple digital identities it could act as a killer application for PKI. The trust for the RSA algorithm is known extensively over lot of Internet application and banking sectors to securely access the data online. The police have to trust the technology to use within the organisation.

7. Conclusion

I would personally recommend using the character password reveals once identity to access the rights provided within the organisation. Recommending the hand recognition is recommended as it is can sense the physical and live presence of the authorized person over using the dead organ of the human being in preventing security breach. The infrared lights are used to identify the vein on the hand with reference to the captured data.

8. References