{"id":13153,"date":"2021-12-06T19:12:03","date_gmt":"2021-12-07T00:12:03","guid":{"rendered":"https:\/\/carleton.ca\/scs\/?page_id=13153"},"modified":"2021-12-06T19:12:03","modified_gmt":"2021-12-07T00:12:03","slug":"tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking","status":"publish","type":"page","link":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/","title":{"rendered":"TR-05-12: On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking"},"content":{"rendered":"<p>Carleton University<br \/>\n<a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\">Technical Report<\/a> TR-05-12<br \/>\nDecember 22, 2005<\/p>\n<h2>On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking<\/h2>\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">\n<p class=\"tr_t3\">P.C. Van Oorschot &amp; Stuart G. Stubblebine<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<h3>Abstract<\/h3>\n<p>Abstract: We define identity theft as the unauthorized use and exploitation of another individual&#8217;s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen or forged credentials, we propose an authentication architecture and system combining a physical location cross-check, a method for assuring uniqueness of location claims, and a centralized verification process. We provide two example protocol implementations of this system, for two representative applications. We believe that this system merits consideration for practical use, and will stimulate further technical solutions to the broad problem of identity theft.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-12.pdf\">TR-05-12.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Carleton University Technical Report TR-05-12 December 22, 2005 On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking P.C. Van Oorschot &amp; Stuart G. Stubblebine Abstract Abstract: We define identity theft as the unauthorized use and exploitation of another individual&#8217;s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to [&hellip;]<\/p>\n","protected":false},"author":49,"featured_media":0,"parent":12337,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TR-05-12: On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking - School of Computer Science<\/title>\n<meta name=\"description\" content=\"Carleton University Technical Report TR-05-12 December 22, 2005 On Identity Theft and a Countermeasure based on Digital Uniqueness and Location\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/\",\"url\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/\",\"name\":\"TR-05-12: On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking - School of Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/scs\/#website\"},\"datePublished\":\"2021-12-07T00:12:03+00:00\",\"dateModified\":\"2021-12-07T00:12:03+00:00\",\"description\":\"Carleton University Technical Report TR-05-12 December 22, 2005 On Identity Theft and a Countermeasure based on Digital Uniqueness and Location\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/scs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SCS Technical Reports\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Technical Reports 2005\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"TR-05-12: On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/scs\/#website\",\"url\":\"https:\/\/carleton.ca\/scs\/\",\"name\":\"School of Computer Science\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/scs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TR-05-12: On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking - School of Computer Science","description":"Carleton University Technical Report TR-05-12 December 22, 2005 On Identity Theft and a Countermeasure based on Digital Uniqueness and Location","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/","url":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/","name":"TR-05-12: On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking - School of Computer Science","isPartOf":{"@id":"https:\/\/carleton.ca\/scs\/#website"},"datePublished":"2021-12-07T00:12:03+00:00","dateModified":"2021-12-07T00:12:03+00:00","description":"Carleton University Technical Report TR-05-12 December 22, 2005 On Identity Theft and a Countermeasure based on Digital Uniqueness and Location","breadcrumb":{"@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/scs\/"},{"@type":"ListItem","position":2,"name":"Research","item":"https:\/\/carleton.ca\/scs\/research\/"},{"@type":"ListItem","position":3,"name":"SCS Technical Reports","item":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/"},{"@type":"ListItem","position":4,"name":"Technical Reports 2005","item":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/"},{"@type":"ListItem","position":5,"name":"TR-05-12: On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/scs\/#website","url":"https:\/\/carleton.ca\/scs\/","name":"School of Computer Science","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/scs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/13153"}],"collection":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/comments?post=13153"}],"version-history":[{"count":1,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/13153\/revisions"}],"predecessor-version":[{"id":13154,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/13153\/revisions\/13154"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12337"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/media?parent=13153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}