All the latest UK technology news, reviews and analysis

RSA: Vint Cerf lays down unified authentication gauntlet

28 Feb 2013

One of the early architects of the internet is calling on the security community to develop an authentication platform for next-generation technologies.

Vint Cerf issued a challenge to attendees at the 2013 RSA conference to develop an improved authentication system which would provide public and private keys to help consumers authenticate their presence on multiple devices, platforms and services easily.

The IT icon suggested that as new devices gain internet connectivity and users access new services, a system to verify signatures would become essential. Cerf's plan would bring a single platform that would not only authenticate users but also allow them to verify purchases and assign their signatures on documents.

"There are all kinds of details we have to work out in order to make sure this can be trusted as much as physical signatures," Cert told the audience at his keynote address.

"We certainly don't want the digital environment to be any less trusted than the physical world is."

Cert admitted that the challenge was a daunting one. He said that he has no specific plan for how his theoretical platform would be constructed and could not offer and specific descriptions.

Rather, he said that the security community as a whole should consider the possibility of such a platform and begin development on the technologies which could someday make it a reality. Without such a system, he said, the security sector risks falling behind the advancements made in other parts of the IT space.

"As we introduce more computing power into these devices, someday the headline may be 'attack of the refrigerators," Cerf joked.

"There might be 100 or 200 devices associated with us, we don't want them to be interfered with."

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Shaun Nichols

Shaun Nichols is the US correspondent for He has been with the company since 2006, originally joining as a news intern at the site's San Francisco offices.

More on Security
What do you think?
blog comments powered by Disqus

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?

Popular Threads

Powered by Disqus
Galaxy S5 vs Xperia Z2 home screen

Xperia Z2 vs Galaxy S5

We break down the strengths and weaknesses of the two Android heavyweights

Updating your subscription status Loading

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery


iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

SAS Insight Analyst / Macro / Base / SQL Server

SAS Insight Analyst / Macro / Base / SQL Server...

Design & Implementation Network Engineer – CCNP / CCIP / MPLS

Cisco Design & Implementation Network Engineer at...

Application Support Analyst (Technical Support, Trading System)

Application Support Analyst (Technical Support, Trading...

IT Business Partner

Are you an excellent communicator capable of working...
To send to more than one email address, simply separate each address with a comma.