Business plane | Credit, Brand Compliance, Contractual, Maturity | Identity regulator (IDR), Identity management authority (IDMA), Identity authorized organization (IDAO) | Lack of penetrating regulatory capacity Inappropriate regulation Falsify/delete/tamper with identity?related date to avoid regulatory responsibility Lack the ability to identity business operations Lack of control over agencies and authorized organizations Emergency response mechanism failed Identity spam Failure to use the Identity for the intended purpose and manner |
Asset plane | Identity management service, Identity resolution service, Identity authentication service, Identified asset ownership, Administrator right, Income right, Right to use | IDR, IDMA, IDAO, Identity collaborator | Lack of long?term and continuous identity services operation Insufficient identity service performance and unresponsiveness Interoperability risks Lack of auditing for identity services Insufficient privacy protection for users of identity services Lack of sufficient strength for identity authentication Inadequate protection of ownership and administrative rights of identity, and easy to be misappropriated Improper use of identity and the disposal of income rights are prone to disputes Identity information and services that have been tampered with and redirected Supply chain collusion attack |
Service plane | Identity application, Identity data availability, Confidentiality, Integrity | IDAO, Application developer, Partner, Customer, End user | Signaling storm brought by massive III related equipment Reliance on external identity services compromises low latency and high availability |
Environment plane | Identity, Identifier, Medium, Device Confidentiality, Integrity, Fault tolerance, Efficiency, Manageability | IDAO, Device vendor, Medium vendor, End user | The identity medium lacks anti?fouling and error correction capabilities The identifier code can be maliciously modified The length and structure of the identifier affect the efficiency of field identification Low-power devices are difficult to achieve high-intensity authentication and encryption for identity related tasks Unmanned environment lacks field maintenance for identity security In an open environment, identity credentials and information can be stolen |