Monday, October 27, 2008

The Challenges of Virtual Identity Management

At ISS World Europe a couple of weeks ago, Qosmos presented at a seminar focused on lawful interception and network intelligence gathering.

What comes out clear from the ISS conference is the need for efficient Virtual Identity Management. Put simply: in the context of legal intercept, how do you track a user who can be anywhere, use anything, connect by any means, and who uses multiple virtual IDs ?

Successful and effective Virtual Identity Management, means being able to recognize and extract a target identifier over a wide variety of applications. And this is by no means easy. To take the case of http: the same protocol is used by different applications, which means you must understand the logic of the applications above http. In such cases, the successful recognition and extraction of target identifiers requires the implementation of complex mechanisms specifically developed for these applications, and a maintenance and upgrade policy that enables you both to keep tabs on frequent changes in protocol structures and take on board new applications. And from a global perspective, this means keeping abreast of regional apps like QQ (China), Mail.ru (Russia) and India Times webmail!

These are some of the interesting challenges we work on at Qosmos.

P.S.: On my next post, I'll speak of my upcoming TeleStrategies webinar, where the focus will be on information extraction in the field of Business Intelligence.

Jerome

No response to “The Challenges of Virtual Identity Management”

Leave a reply

 
© 2009 Network Intelligence Technology. All Rights Reserved | Powered by Blogger
Design by psdvibe | Bloggerized By LawnyDesignz