A key concept is "Informed Pull" which allows consuming information from other parties, neither violating the interest of the individual for protecting his information nor the interest of the related party/parties.
At KuppingerCole we expect and predict that Life Management Platforms, with related standards, protocols, business models, applications, etc., will be the one technology driven component that will have the strongest influence on our everyday life (and, on the other side, on enterprise infrastructures and the Internet architecture) for the next 10 years."
Life Management Platform are far more than Personal Data Stores or Personal Clouds as Life Management Platform not only support a secure store for sensitive personal information. They allow making a better use of that information by adding Information Rights Management. The real value lies in the sharing of that information supported by Life Management Platform.
To further clarify that, a comparison of key features of a Life Management Platform:
Feature | Life Management Platform | Personal Data Stores | Social Networks |
---|---|---|---|
Protected information store for sensitive personal data | X | X | - |
Granular Access Control for data stored on Platform | X | X | - |
Information Control remains with individual | X | X | - |
Secure Information Sharing with explicit consent of information owner (Controlled Push) | X | (X) | - |
Apps to support privacy- and security-aware information sharing | X | - | - |
Support for the concept of Informed Pull | X | - | - |
Platforms, Personal Data Stores, and today’s typical Social Networks. The concept of Life Management Platform thus is based on the combination of a Personal Domain holding all information securely and the ability to use this data in a privacy-aware and security-aware way. Approaches which lack either of these two core features are not understood as Life Management Platform as defind by KuppingerCole.
Life Management Platform follows several of The Seven Laws Of Identity including:
OpenID Connect which uses OAuth 2.0 when implemented with User-Managed Access is a step in the right direction.