My name is Jeff Bohren and I am a software developer/architect living in Tampa FL. This blog deals mostly with Identity and Identity Management issues, although I will randomly divert into other topics that I find interesting.

I have 20 years experience in software development, mostly doing commercial software product development. I have been blessed with a wide variety of opportunities. In addition to 5 years of developing network management software for ARINC, I spent 10 years developing Identity Management software for Access360, OpenNetwork Technologies,  BMC Software, and now OptimalIdM. I was one of the architects that developed the product that is now known as Tivoli Identity Manager.

In addition to software development and architecture I have also been involved in several standards efforts. At Access360 I worked on DSML V2 and one of its predecessors, DAML. At OpenNetwork and BMC I was involved in OASIS standards for SPML, SAML, and WSDM. I was also the BMC representative to OATH and the Liberty Alliance.

Oddly enough I didn’t start out wanting work in the software industry. I actually earned my BS and MS in Aerospace Engineer at the U. of Florida. After earning my masters I had two job offers, one to work in Huntsville on the ISS and one at a small defense contractor in Torrance CA. Well one trip to Alabama and one trip to Southern California, and I decided to write software for a living instead.

Anyway, I hope you enjoy my random identity musing. If you want to drop me a line, my email is my first initial and last name at Yahoo.

2 responses to “About

  1. Jeff,

    We believe we have significant ideas for the next generation (five to ten year time frame) of identity management services. Before we post our ideas to the main newsgroup at Identity Commons, we would greatly appreciate your input.

    In the very near future digital wallets on cell phones enabled by NFC technologies will create a radical transformation in identity management and financial transactions processing. This transformation will provide consumers with secure identities and secure financial transactions.

    Whoever controls the infrastructure for secure identities will also control financial transactions.

    The Trust Nexus (http://www.thetrustnexus.com) is a startup company located in Austin, TX. We are building the infrastructure for secure identity in the digital age.

    The basic question is, how can trust be established in the digital age? If you and I have never met and I come to your website or place of business, how can you be confident that I am who I say that I am? The Trust Nexus answers this basic question regarding the establishment of trust.

    We have designed an identity management system, that will eliminate the possibility of identity theft for all participants, protect consumers and financial institutions from fraudulent transactions and solve many of the systemic problems of the current Public Key Infrastructure system, especially the problems of certificate revocation lists (CRLs) and on-line status checking.

    Our solution is simple, practical and transparent to the consumer. Consumer acceptance will be rapid and widespread. Our solution protects individual privacy and prevents the establishment of monolithic government control. The essence of our approach is very different from the “Big Brother” approach recently announced by India (http://www.timesonline.co.uk/tol/news/world/asia/article6710764.ece#cid=OTC-RSS&attr=2015164). Rather than creating a centralized directory of private information, we will create a central repository containing a collection of localized decisions which will establish an Institutional Web of Trust.

    Compared to a decentralized web of trust which creates a web of individuals with, “the expectation that anyone receiving [a list of signatures] will trust at least one or two of the signatures”, we will create a system where trusted institutions legitimize individual identity. Additionally, the institutional web of trust established by The Trust Nexus will have centralized controller processes that rely greatly on self-management and automation resulting in great efficiencies.

    The Trust Nexus does not secure identity by, “making personal data harder to steal”. Rather, identity is secured by self-managing logical inconsistencies within the system, resolving identity conflicts and preventing fraudulent transactions.

    As Bruce Schneier, author and security guru, pointed out, “Proposed [identity theft] fixes tend to concentrate on the first issue–making personal data harder to steal–whereas the real problem is the second [preventing fraudulent transactions]. If we’re ever going to manage the risks and effects of electronic impersonation [identity theft], we must concentrate on preventing and detecting fraudulent transactions.” [Solving Identity Theft]

    In essence, there are a limited number of institutions worldwide (measured in thousands) that truly matter when it comes to legitimizing identity. Digital wallets on cell phones will enable the efficient association of unique public/private keys to a specific legal identity (legal name and legal address). If there is a non-unique association, an inconsistency arises in the system. If the association is unique and verified by one or more legitimate institutions an individual’s identity is secure (as long as the private key which he/she controls is secure).

    We are confident we have a transforming technology and a clear vision of the future. No one has found a conceptual flaw in the system. Please visit our website (http://www.thetrustnexus.com) and let us know what you think.

    We look forward to hearing from you soon.

    Best regards,

    Michael Duffy
    CEO / CTO
    The Trust Nexus

  2. Pingback: SAML vs XACML for ABAC & AuthZ « Identity Sander

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s