Ingrid Melve writes this blog from her perspective as a Federation Manager for Feide, CTO for the Norwegian research network and real life person with overlapping roles including human, techie, mother and engineer.

Ingrid graduated in 1993 from NTNU with a Master in Electronic Engineering, and has since then worked for UNINETT, the Norwegian research and education network.

2 Responses to “About”


  1. […] woman that has always impressed me in this field though is Ingrid Melve. Ingrid not only holds her own on both the policy and technical fronts of access management, but […]


  2. Ingrid,

    We believe we have significant ideas for the next generation (five to ten year time frame) of identity management services. Before we post our ideas to the main newsgroup at Identity Commons, we would greatly appreciate your input.

    In the very near future digital wallets on cell phones enabled by NFC technologies will create a radical transformation in identity management and financial transactions processing. This transformation will provide consumers with secure identities and secure financial transactions.

    Whoever controls the infrastructure for secure identities will also control financial transactions.

    The Trust Nexus (http://www.thetrustnexus.com) is a startup company located in Austin, TX. We are building the infrastructure for secure identity in the digital age.

    The basic question is, how can trust be established in the digital age? If you and I have never met and I come to your website or place of business, how can you be confident that I am who I say that I am? The Trust Nexus answers this basic question regarding the establishment of trust.

    We have designed an identity management system, that will eliminate the possibility of identity theft for all participants, protect consumers and financial institutions from fraudulent transactions and solve many of the systemic problems of the current Public Key Infrastructure system, especially the problems of certificate revocation lists (CRLs) and on-line status checking.

    Our solution is simple, practical and transparent to the consumer. Consumer acceptance will be rapid and widespread. Our solution protects individual privacy and prevents the establishment of monolithic government control. The essence of our approach is very different from the “Big Brother” approach recently announced by India (http://www.timesonline.co.uk/tol/news/world/asia/article6710764.ece#cid=OTC-RSS&attr=2015164). Rather than creating a centralized directory of private information, we will create a central repository containing a collection of localized decisions which will establish an Institutional Web of Trust.

    Compared to a decentralized web of trust which creates a web of individuals with, “the expectation that anyone receiving [a list of signatures] will trust at least one or two of the signatures”, we will create a system where trusted institutions legitimize individual identity. Additionally, the institutional web of trust established by The Trust Nexus will have centralized controller processes that rely greatly on self-management and automation resulting in great efficiencies.

    The Trust Nexus does not secure identity by, “making personal data harder to steal”. Rather, identity is secured by self-managing logical inconsistencies within the system, resolving identity conflicts and preventing fraudulent transactions.

    As Bruce Schneier, author and security guru, pointed out, “Proposed [identity theft] fixes tend to concentrate on the first issue–making personal data harder to steal–whereas the real problem is the second [preventing fraudulent transactions]. If we’re ever going to manage the risks and effects of electronic impersonation [identity theft], we must concentrate on preventing and detecting fraudulent transactions.” [Solving Identity Theft]

    In essence, there are a limited number of institutions worldwide (measured in thousands) that truly matter when it comes to legitimizing identity. Digital wallets on cell phones will enable the efficient association of unique public/private keys to a specific legal identity (legal name and legal address). If there is a non-unique association, an inconsistency arises in the system. If the association is unique and verified by one or more legitimate institutions an individual’s identity is secure (as long as the private key which he/she controls is secure).

    We are confident we have a transforming technology and a clear vision of the future. No one has found a conceptual flaw in the system. Please visit our website (http://www.thetrustnexus.com) and let us know what you think.

    We look forward to hearing from you soon.

    Best regards,

    Michael Duffy
    CEO / CTO
    The Trust Nexus
    http://www.thetrustnexus.com

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s