SHARE
Facebook X Pinterest WhatsApp

IBM Tests Identity Mixer Encryption Service to Secure Data

Five Critical Tenets of Identity and Access Management In a move that could simultaneously eliminate data privacy concerns along with the headaches associated with actually authenticating users, IBM this week unfurled its Identity Mixer service, which makes use of a new engine to encrypt identities. Dr. Jan Camenisch, cryptographer and co-inventor of Identity Mixer at […]

Written By
MV
Mike Vizard
Jan 29, 2015
Slide Show

Five Critical Tenets of Identity and Access Management

In a move that could simultaneously eliminate data privacy concerns along with the headaches associated with actually authenticating users, IBM this week unfurled its Identity Mixer service, which makes use of a new engine to encrypt identities.

Dr. Jan Camenisch, cryptographer and co-inventor of Identity Mixer at IBM Research, says Identity Mixer eliminates the need for IT organizations to collect information such as age, nationality, address and, most importantly, credit card numbers. Instead, users will have a set of encrypted credentials that are verified by Identity Mixer, says Camenisch. This approach eliminates the need for users to share personal information, while also making it simpler for anyone providing a service on the Web to verify user identities.

Right now, IBM is running a public beta of IBM Identity Mixer on its Bluemix cloud platform. But Camenisch says that IBM plans to make Identity Mixer available to any provider of a Web service either through Bluemix or as software they deploy on their own systems.

Data Privacy

IBM isn’t the only vendor experimenting with new types of cryptographic engines to address privacy and security concerns across the Web. After all, the only reason that there is a security issue really is because too many organizations collect personally identifiable information in plain text, thereby making themselves a tempting target for hackers.

It will be interesting to see how new approaches to cryptography evolve in the years ahead alongside multiple standards that address data privacy and security. In the meantime, there’s some comfort in knowing that the industry is at least looking into ways to solve the problem.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.