Electronic ID in Germany. Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event

Size: px
Start display at page:

Download "Electronic ID in Germany. Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event"

Transcription

1 Electronic ID in Germany Dr. Stephan Klein Managing Director Governikus GmbH & Co. KG Logius Event

2 Table of Contents Authentication in Germany Infrastructure (Client, Hardware, Participants) Authentication in Europe TREATS and eidas-middleware Notification German ID Card

3 About Governikus KG Location Governikus GmbH & Co. KG Am Fallturm 9, Bremen Unlimited Partners Unlimited Partner Governikus Bremen GmbH (100,0 % ownership by the Free Hanseatic City of Bremen) Foundation Founded in July 1999 (as bremen online services GmbH & Co. KG) Work Force roughly 130 employees Managing Director Dr. Stephan Klein Limited Partners Freie Hansestadt Bremen: 55,1 % Telekom Deutschland GmbH: 15,0 % Die Sparkasse Bremen: 15,0 % Brekom GmbH (EWE Gruppe): 14,9 % Head of Supervisory Board Dr. Martin Hagen

4 German ID Card Facts (October 2017) Issued electronic IDs More than 18,5 million FORECAST ELECTRONIC ID CARDS GERMANY Service Providers 157 Service Providers (October 2017): ca. 2/3 Public Sector ca. 1/3 Private Sector 18,5 26,5 34,5 42,

5 German eid Infrastructure Requires eid Client And eid Server For Mutual Authentication Figure: Overview of the German eid System / Federal Office for Information Security

6 Decentralized eid Infrastructure Germany Official Documents Card Verifiable Certificates Bundesdruckerei (Federal) D-Trust User / ID Official Client / AusweisApp2 Service Provider eid Server Governikus on behalf of the Federal Ministry of the Interior Different public and private organisations Private Providers (Governikus p.e.) Authentication Certificates and Blacklist Federal Office of Administration

7 AusweisApp2 German eid Client (developed by Governikus on behalf of the Federal Ministry of the Interior): user-friendly, lean, secure and certified Computer and mobile usage with support - Windows, Mac OS X - Android (ios under development / usability tests) Certified Software Development Kit (SDK) / Built-In - Integration in own Applications Certified Software - By Federal Office for Information Security Licenced under EUPL to create own clients, built-ins or other operating systems Smartphone as card reader - To avoid additional hardware Usability tested - Integration in own Applications Approx. 1 Mio. downloads Windows and Mac OS (since November 2014), approx downloads Android (since May 2017)

8 Smartphone (or Tablet) As Card Reader NFC Computer and NFC-Smartphone or NFC-Tablet in the same Wifi The devices have to be connected to the same Wifi NFC

9 Governikus Autent Multifunctional eid Server EU-Middleware POSeIDAS Application of the IT Planning Council Federal Government and Federal States hold the licence SLA silver, bronze und gold available Multiclient capable Multi-authentication possibilities (Certificate-based, Username/Password, ID card) Identity management/ directory service SAML and SOAP acc. totr-3130 Flexible modularisation POSeIDAS limited to SOAP Webservice acc. to TR ID Cards

10 eidas The Perspective Matters Each EU-/EFTA member state is both: sending or receiving member state 1. Sending member state: sends the eid Regarding eidas beeing an sending member state is optional. There is no obligation to notify an ID token 2. Receiving member state: accepts the eid Mandatory as of September 2018 regarding eidas: each country must accept notified ID tokens from other EU-/EFTA countries

11 eidas The Perspective Matters (Example)

12 eidas Middleware in The Netherlands The eidas Middleware, developed by Governikus on behalf of the Federal Ministry of the Interior was successfully deployed in The Netherlands (Demo Portal) (beginning of 2017) and is supplied by Germany as a virtual machine.

13 Motivation for TREATS Federal Ministry of the Interior realised necessary action to get the German infrastructure eidas-ready (2015) Adressed all eid-server manufacturers, call for interest Adressed some relevant service providers to think beyond Asked Governikus KG to coordinate the proposal in the name of Germany Set in addition the Federal Office for Information Security in controlling duty

14 Participants in the TREATS Consortium MTG (media transfer AG) OpenLimit SignCubes GmbH Governikus GmbH & Co. KG (consortial leader) eid server HSH Soft- und Hardware Vertriebs GmbH SiXFORM GmbH Bundesdruckerei GmbH Harz University of Applied Science Anstalt für Kommunale Datenverarbeitung in Bayern (AKDB) Services and Applications Guest / Observer: Federal Ministry of the Interior Federal Office for Information Security Functionality Visibility Mentoring / Observing

15 Goals of TREATS Scope of work in TREATS project Enable existing infrastructure to accept eid token from other EU Member States Provide multiplier effect at once for Germany Lead to an enhanced eid scheme in Germany Enhance selected applications as proof of concept Bring new eidas-enabled infrastructure into production Develop best practice guide for on-boarding process of other service applications

16 Notification of German ID card on How did Germany do this? German-eID/eIDASnotification/eIDAS_notification_node.html;jsessionid=652 4D09940CEDE43D3E644542B14ED7A.1_cid341 Responsible and successfully completed by the Federal Ministry of the Interior and the Federal Office for Information Security Maximum transparency (all documents are publicly available) Politically important / supported by ministerial letters What are the lessons learned? Plenty of work to do! Detailed documentation is essential.

17 Besuchen Sie uns auch in Thanks for your kind attention! Dr. Stephan Klein Tel: Governikus GmbH & Co. KG Am Fallturm Bremen Tel.: Albrechtstraße Berlin Tel.:

NOBLE presentation of the project

NOBLE presentation of the project NOBLE presentation of the project Klaus Lüttich, Governikus KG edelivery Workshop @ ETSI Security Week 14 June 2017 Objective and Context of NOBLE The OBJECTIVE is to set up an edelivery infrastructure

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen

More information

Deutsches Maritimes Kompetenz Netz

Deutsches Maritimes Kompetenz Netz www.dmkn.de Deutsches Maritimes Kompetenz Netz German Association for Marine Technology, Hamburg November 21st, 2006 Contact: Dr. Michael Bauer, NetSkill AG, Saalmannstraße 7-9, 13403 Berlin, Tel.: 03

More information

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals

More information

The German IT Security Certification Scheme. Joachim Weber

The German IT Security Certification Scheme. Joachim Weber The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.

More information

Automated Mobile Security (ESUKOM)

Automated Mobile Security (ESUKOM) Technical Paper Automated Mobile Security () Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices Network Communications Products engineering

More information

German eid based on Extended Access Control v2

German eid based on Extended Access Control v2 German eid based on Extended Access Control v2 Overview of the German eid system Version 1.2 21. August 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0

More information

Smart Data and its impact for Germany

Smart Data and its impact for Germany Smart Data and its impact for Germany Dr. Alexander Tettenborn i-know, 19.10.2016, Graz www.bmwi.de The German Digital Economy * 221 bn. turnover (ICT sector) 100 bn. turnover (internet economy) 5.6 %

More information

Data Privacy Statement for myportal to go

Data Privacy Statement for myportal to go Data Privacy Statement for myportal to go Contents 1. Scope... 2 2. Data Handled by Unify Through myportal to go... 2 3. Disclosure of Your Personal Data... 3 4. Accessing, Correcting and Deleting Your

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

{ Mobile Printing Send Print Jobs from any Location }

{ Mobile Printing Send Print Jobs from any Location } { Mobile Printing Send Print Jobs from any Location } Web Printer Driver Mobile Apps Mobile Printing Google Cloud Print Email/ Guest Printing Apple AirPrint Wep Upload The Next Step in Office Mobility

More information

SAT for eid [EIRA extension]

SAT for eid [EIRA extension] SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

NFC. control time RFID. copy protection. Barcode. Security. App. Quick control. NFC eco system ISO Secure Element. Near Field Communication

NFC. control time RFID. copy protection. Barcode. Security. App. Quick control. NFC eco system ISO Secure Element. Near Field Communication Quick control Casual users App mobile ticketing NFC Smartphone OPTIMOS Investment protection RFID control time Ticket issuing mobile network Data transfer Ticket purchase existing infrastructure Security

More information

@firma, Validation Platform for PKIs

@firma, Validation Platform for PKIs @firma, Validation Platform for PKIs Miguel Álvarez Rodríguez Ministry of Public Administration of Spain Brussels, 13 th November 2008 Current national scenario on eid PKI digital certificates are the

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY THE JOURNEY OF Sri Lanka TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY Presented by Dr. Ajith Madurapperuma on behalf of the ICTA Email: ajitolanka@gmail.com A PRESENTATION BY The Information Communication

More information

Chiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben

Chiffry. Secure smartphone communication Statustext eingeben. Chiffry-Zertifikat: Chiffry-Zertifikat: Statustext eingeben Chiffry Secure smartphone communication 09:41 Profil +49124148155122 Statustext eingeben Chiffry-Zertifikat: Profil Einladen Chats Gruppe Einstellungen Profil Einladen Chats Gruppe Einstellungen Chiffry-Zertifikat:

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

White Paper Implementing mobile electronic identity

White Paper Implementing mobile electronic identity Implementing mobile electronic identity A DXC Enterprise approach based on hardware token microsd card Table of contents Secure Element form factors in mobile devices 2 Other alternatives for implementing

More information

1. E Government, where did we start 2. The Federal Government s IT strategy, E Government Deutschland Online

1. E Government, where did we start 2. The Federal Government s IT strategy, E Government Deutschland Online Office of the CIO at the Federal Ministry of the Interior The e government and IT strategy pursued by the Federal Government Tim Schröder Federal Ministry of the Interior 10 November 2006 Agenda 1., where

More information

Designing XML Security Services for Biodiversity Networks

Designing XML Security Services for Biodiversity Networks Designing XML Security Services for Biodiversity Networks Robert Tolksdorf 1, Lutz Suhrbier 2, Ekaterina Langer 3 Freie Universität Berlin, Networked Information Systems Institut für Informatik, Takustraße

More information

esignature Infrastructure Marketing Model

esignature Infrastructure Marketing Model www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of

More information

Das Fraunhofer. Fraunhofer MOEZ 1 Fraunhofer MOEZ

Das Fraunhofer. Fraunhofer MOEZ 1 Fraunhofer MOEZ Das Fraunhofer 1 Enhancing Ukraine`s Competitiveness in RI on the way to the Association to Horizon 2020-2nd Stakeholders Forum of BILAT-UKR*AINA Technology Transfer: Framework Conditions And Good Practices

More information

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Sebastian Feld, Norbert Pohlmann Institute for Internet-Security, if(is) Gelsenkirchen University of Applied

More information

TRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM JACIC Hiroyuki ISHIWATA

TRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM JACIC Hiroyuki ISHIWATA TRANSITIONING OF CRYPTOGRAPHIC ALGORITHMS IN THE ELECTRONIC BIDDING CORE SYSTEM 2013.11.8 JACIC Hiroyuki ISHIWATA JACIC Electronic Bidding Core System Development Consortium introduce myself author name:

More information

The new Service Account For citizens and authorities

The new Service Account For citizens and authorities The new Service Account For citizens and authorities - 1 - Legal Notices Copyright 2016 of the Ministry of Internal Affairs of the State of Baden-Württemberg and SEITENBAU GmbH, Konstanz All rights reserved,

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

Giesecke+Devrient. Company Presentation

Giesecke+Devrient. Company Presentation Giesecke+Devrient Company Presentation Our vision G+D makes the lives of billions of people more secure We want to be the global leading provider of security technologies, both in the digital and physical

More information

STORK Secure Identity Across Borders Linked

STORK Secure Identity Across Borders Linked STORK Secure Identity Across Borders Linked Projekt STORK Status und Ausblick 2011 BITKOM FA eid 20. Januar 2011 / Berlin Volker Reible / T-Systems Stork is an EU co-funded project INFSO-ICT-PSP-224993

More information

The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017

The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017 The Top Four Trends in eid Technology Marco Smeja, cryptovision Mindshare 2017 cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 2 The Smart Card Evolution

More information

Sino-German Cooperation on Industrie 4.0 中德工业 4.0 合作

Sino-German Cooperation on Industrie 4.0 中德工业 4.0 合作 Sino-German Cooperation on Industrie 4.0 中德工业 4.0 合作 Imprint Publisher Bundesministerium für Wirtschaft und Energie (BMWi) Öffentlichkeitsarbeit 11019 Berlin, Germany www.bmwi.de Editorial office Deutsche

More information

IFIP World Computer Congress (WCC2010)

IFIP World Computer Congress (WCC2010) IFIP World Computer Congress (WCC2010) Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks Prof. Dr.-Ing. Kai-Oliver Detken DECOIT GmbH, http://www.decoit.de,

More information

This help covers the ordering, download and installation procedure for Odette Digital Certificates.

This help covers the ordering, download and installation procedure for Odette Digital Certificates. This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette

More information

Identity Management Systems An Overview. IST Event 2004 /

Identity Management Systems An Overview. IST Event 2004 / IST Event 2004 / 15.11.2004 Marit Hansen / Henry Krasemann Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany Overview Identity Management

More information

Security Aspects of Trust Services Providers

Security Aspects of Trust Services Providers Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00

More information

JOURNEY TO YOUR CLOUD. Mika Kotro Sales Development EMC Deutschland GmbH. Copyright 2012 EMC Corporation. All rights reserved.

JOURNEY TO YOUR CLOUD. Mika Kotro Sales Development EMC Deutschland GmbH. Copyright 2012 EMC Corporation. All rights reserved. 1 JOURNEY TO YOUR CLOUD Mika Kotro Sales Development EMC Deutschland GmbH 2 The Journey To Your Cloud: Infrastructure Private Cloud Is A Logical First Step Enterprise IT Complex Trusted Controlled Expensive

More information

PRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9

PRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9 PRICE LIST TRUST SERVICE PRODUCTS Price List Version 5.9 Berlin, April 2018 Copyright 2018, Bundesdruckerei GmbH Seite 1/9 Qualified Single Signature Cards D-TRUST Card 3.0 EU Signature card according

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Technical Guideline TR eid-server. Part 2: Security Framework for eid-server operations

Technical Guideline TR eid-server. Part 2: Security Framework for eid-server operations Technical Guideline TR-03130 eid-server Part 2: Security Framework for eid-server operations Version 2.1.2 October 25, 2017 Document history Version Date Description 0.4 Draft August 20, 2013 Initial External

More information

Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security

Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security Mind Over Matter: The Pragmatic, Strong, and Smart Approach to Security SESSION ID: SPO1-T09 Ammar Alkassar CEO Sirrix AG security technologies Saarbrücken, Germany Dr. Kim Nguyen Managing Director D-Trust

More information

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration

More information

ZB MED. Libraries and the Information Infrastructure in Germany: Nutrition Environment Agriculture. Medicine Health

ZB MED. Libraries and the Information Infrastructure in Germany: Nutrition Environment Agriculture. Medicine Health Libraries and the Information Infrastructure in Germany: standards and recent developments Ulrich Korwitz German National Library of Medicine ZB MED Foto Haus Bonn Medicine Health Nutrition Environment

More information

Sponsoring of Continuing Medical Education in Germany

Sponsoring of Continuing Medical Education in Germany ZEVA meeting Bratislava, 25 September 2014 Sponsoring of in Germany Domen Podnar, Policy Advisor, International Department 1 Physicians self-governance in Germany State Chambers of Physicians - Compulsory

More information

The ehealth platform

The ehealth platform Cookbook How to call the Qermid Tuco web services and the test process Version 1.0 This document is provided to you free of charge by The ehealth platform Willebroekkaai 38 Quai de Willebroeck 38 1000

More information

Digital Austria = egov best practice in d Europe

Digital Austria = egov best practice in d Europe Digital Austria = egov best practice in d Europe egovernment ICT Digital Agenda - Digital Roadmap eidas Univ.Lect. Christian Rupp, CMC ICT in the public sector is like a large vessel - it needs clear

More information

German Research Strategy in the Area of Civil Security Research

German Research Strategy in the Area of Civil Security Research 8th Interdisciplinary Workshop on Global Security WISG 2014 German Research Strategy in the Area of Civil Security Research Eckhart Curtius Federal Ministry of Education and Research Division Security

More information

Introduction to the Extended Development Platform

Introduction to the Extended Development Platform Hong Kong 2018 Introduction to the Extended Development Platform Richard Schaefer, Sr. Enterprise Solution Manager BlackBerry Development Platform A collection of enterprise ready tools which enable enterprise

More information

2. HDF AAI Meeting -- Demo Slides

2. HDF AAI Meeting -- Demo Slides 2. HDF AAI Meeting -- Demo Slides Steinbuch Centre for Computing Marcus Hardt KIT University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association www.kit.edu Introduction

More information

eid Consulting References

eid Consulting References eid Consulting References Selection of References We are renown for running eid, epassport, eborder projects MOI Germany President of Nigeria Royal Oman Police MOI of U..A.E. MOI of Sudan European Commission

More information

International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018

International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 International Legal Regulation of Cybersecurity U.S.-German Standards Panel 2018 Dr. Dennis-Kenji Kipker University of Bremen Washington DC, 10.04.2018 Gefördert vom FKZ: 16KIS0213 bis 16KIS0216 Slide

More information

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token Technical Guideline TR-03130-3 eid-server Part 3: eidas-middleware-service for eidas-token Version 1.0 5. May 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899

More information

G/On. G/On is available for Windows, MacOS and Linux (selected distributions).

G/On. G/On is available for Windows, MacOS and Linux (selected distributions). G/On Soliton G/On is a remote access solution which establishes connections between a remote device and application servers inside an organisations network. A secure gateway is used to separate the remote

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

State-of-the-Art Technology in support of Disaster Management. T-Systems. Enabler of connected life and work.

State-of-the-Art Technology in support of Disaster Management. T-Systems. Enabler of connected life and work. State-of-the-Art Technology in support of Disaster Management. T-Systems. Enabler of connected life and work. Jurry de la Mar. T-Systems International GmbH. Deutsche Telekom. Partner for connected life

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek

Conformity and Interoperability Key Prerequisites for Security of eid documents. Holger Funke, 27 th April 2017, ID4Africa Windhoek Conformity and Interoperability Key Prerequisites for Security of eid documents Holger Funke, 27 th April 2017, ID4Africa Windhoek Agenda 1. About secunet Security Networks AG 2. Timeline of interoperability

More information

Promotion. Grow Develop - Attack. Xtra Cash The Unify incentive program for reseller Sales Reps

Promotion. Grow Develop - Attack. Xtra Cash The Unify incentive program for reseller Sales Reps Promotion Grow Develop - Attack Xtra Cash The Unify incentive program for reseller Sales Reps Welcome to OpenScape Business Rewards The OpenScape Business Rewards Programme provides you with the opportunity

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

Germany Candidate for the ITU Council

Germany Candidate for the ITU Council Germany Candidate for the ITU Council Germany Candidate for the ITU Council International Telecommunication Union is an important forum for global co-operation in the various areas of ICTs. Germany continuously

More information

AusweisApp2 Manual Release

AusweisApp2 Manual Release AusweisApp2 Manual Release 1.14.0 Governikus GmbH & Co. KG 20.12.2017 Contents 1 Installation of AusweisApp2 on a Windows operating system 1 1.1 Dialog page Welcome - Step 1 of 5.............................

More information

5 th Meeting of the European Heritage Legal Forum. Wolfgang Karl Göhner

5 th Meeting of the European Heritage Legal Forum. Wolfgang Karl Göhner 5 th Meeting of the European Heritage Legal Forum Influences of EHLF activities on national developments on energy efficiency and construction products: Test case Germany by http://w-goehner.de Tel: ++49

More information

ETSI - European CA-Day. November 29th 2012 I Dr. Kim Nguyen, Chief Scientist Security, Managing Director D-Trust

ETSI - European CA-Day. November 29th 2012 I Dr. Kim Nguyen, Chief Scientist Security, Managing Director D-Trust ETSI - European CA-Day November 29th 2012 I Dr. Kim Nguyen, Chief Scientist Security, Managing Director D-Trust Bundesdruckerei Group Bundesdruckerei GmbH BIS Bundesdruckerei International Services GmbH

More information

SUBJECT: PRESTO operating agreement renewal update. Committee of the Whole. Transit Department. Recommendation: Purpose: Page 1 of Report TR-01-17

SUBJECT: PRESTO operating agreement renewal update. Committee of the Whole. Transit Department. Recommendation: Purpose: Page 1 of Report TR-01-17 Page 1 of Report TR-01-17 SUBJECT: PRESTO operating agreement renewal update TO: FROM: Committee of the Whole Transit Department Report Number: TR-01-17 Wards Affected: All File Numbers: 465-12, 770-11

More information

Towards a European e-competence Framework

Towards a European e-competence Framework Towards a European e-competence Framework Projects, trends, multistakeholder activities towards a European ICT sectoral framework, related to the EQF Jutta Breyer Brussels, 24 June 2008 Overview 1. Intro

More information

Utimaco HSM Introduction JIPDEC Seminar June 2017

Utimaco HSM Introduction JIPDEC Seminar June 2017 Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM

More information

CLOUD QUALITY AND CLOUD CERTIFICATION

CLOUD QUALITY AND CLOUD CERTIFICATION CLOUD QUALITY AND CLOUD CERTIFICATION 8th EuroCloud Congress Cloud, Trust & Security 25th October 2017 / Brussels, Belgium Ivana Tepčević Project Manager and Lead Auditor, SGS Belgrade AGENDA SGS in brief

More information

eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017

eidas & e-delivery CE Midsummer Conference The role of policy decisions in the postal & delivery industry, Copenhagen (DK), 12 June 2017 eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017 Andrea Servida DG CONNECT, European Commission Unit "egovernment

More information

Technical guidelines implementing eidas

Technical guidelines implementing eidas Technical guidelines implementing eidas Sławek Górniak CA/Day Berlin 19 th September 2016 European Union Agency for Network and Information Security About ENISA 2 Positioning ENISA activities 3 ENISA and

More information

RELATIONSHIP WITH KONICA MINOLTA

RELATIONSHIP WITH KONICA MINOLTA JOHN ENJOY DOE A FLEXIBLE INC. ENJOYS MOBILE TRUSTFUL WORKSTYLE RELATIONSHIP WITH KONICA MINOLTA Global technology leader profits from document security, lower costs, greener printing and the same level

More information

INSPIRE and Service Level Management Why it matters and how to implement it

INSPIRE and Service Level Management Why it matters and how to implement it Service Level Agreements for D-Grid INSPIRE and Service Level Management Why it matters and how to implement it Bastian Baranski con terra GmbH Münster, Germany http://www.sla4d-grid.de Motivation Evolution

More information

Trusted Cloud Building Up Trust in Cloud Computing. CeBIT 2017 Hannover

Trusted Cloud Building Up Trust in Cloud Computing. CeBIT 2017 Hannover Trusted Cloud Building Up Trust in Cloud Computing CeBIT 2017 Hannover 1 Trusted Cloud reduces obstacles to the use of cloud technologies Reasons of companies in Germany for not using cloud services Source:

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Please the completed POL to the following address:

Please  the completed POL to the following address: Hello [Customer], Symantec is unable to verify the order details you have provided in our currently available public resources. To continue processing your code signing certificate for [Organization],

More information

Cross border eservices STORK 2.0

Cross border eservices STORK 2.0 Cross border eservices STORK 2.0 Frank LEYMAN EEMA / BCS Thought Leadership Seminar December 2nd, 2014, London Stork 2.0 is an EU co funded project INFSO ICT PSP 297263 STORK Phase 1 Key facts Project

More information

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department. Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company D-TRUST GmbH Kommandantenstraße 15 10969 Berlin, Germany to confirm that its trust service D-TRUST qualified

More information

Scottish Wide Area Network (SWAN) update & Partnership Connectivity

Scottish Wide Area Network (SWAN) update & Partnership Connectivity Scottish Wide Area Network (SWAN) update & Partnership Connectivity Scotland NHS-HE Forum 27 th October, 2016 Andrew Howe, University of St Andrews Ron MacDonald, National Services Scotland Partnership

More information

The energy sector reloaded

The energy sector reloaded 1 The energy sector reloaded Association of Energy Market Innovators 2 Discourse at bne is very much in line with our approach as a network company. That s because the combination of expertise across sectors,

More information

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization

More information

WP JRA1: Architectures for an integrated and interoperable AAI

WP JRA1: Architectures for an integrated and interoperable AAI Authentication and Authorisation for Research and Collaboration WP JRA1: Architectures for an integrated and interoperable AAI Christos Kanellopoulos Agenda Structure and administrative matters Objectives

More information

CONTENTS. TESTING INSTRUCTIONS Appendix 1 to the Stakeholder testing plan. Project to establish the National Incomes Register 1(13)

CONTENTS. TESTING INSTRUCTIONS Appendix 1 to the Stakeholder testing plan. Project to establish the National Incomes Register 1(13) 1(13) CONTENTS 1 Start of testing... 4 2 Testing agreement... 4 3 Testing addresses... 5 4 Instructions for generating a test certificate in the certificate service... 5 4.1 Requirements for generating

More information

Enterprise Mobility Management

Enterprise Mobility Management B L A C K B E R R Y K E E P S Y O U R B U S I N E S S M O V I N G Enterprise Mobility Management Perfectly balancing end-user and corporate needs 800.972.3922 + Enterprise mobility is enabling organizations

More information

Energy Efficiency Export Initiative a service to promote Energy Efficiency made in Germany

Energy Efficiency Export Initiative a service to promote Energy Efficiency made in Germany Welcome Energy Efficiency Export Initiative a service to promote Energy Efficiency made in Germany Susanne Lein Head of Coordination Office Energy Efficiency Export Initiative ENERGY EFFICIENCY CONFERENCE

More information

Premium Membership Package [N5, 000]

Premium Membership Package [N5, 000] NigeriaTrainingNetwork [NTN] and NigeriaTrainingCourses [NTC] are platforms that connects students, trainers and companies together. The platform comprises of private, work based, professional individuals,

More information

AS emas emudhra Authentication Solution

AS emas emudhra Authentication Solution AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a

More information

Overview of cryptovision's eid Product Offering. Presentation & Demo

Overview of cryptovision's eid Product Offering. Presentation & Demo Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

TLS-Federation. Dr. Bud P. Bruegger. Dr. Detlef HühnleinH. Prof. Guido Marinelli. U.Rome Tor Vergata (Italy) Comune di Grosseto (Italy)

TLS-Federation. Dr. Bud P. Bruegger. Dr. Detlef HühnleinH. Prof. Guido Marinelli. U.Rome Tor Vergata (Italy) Comune di Grosseto (Italy) TLS-Federation Dr. Bud P. Bruegger Dr. Detlef HühnleinH Prof. Guido Marinelli Comune di Grosseto (Italy) Secunet (Germany) U.Rome Tor Vergata (Italy) Scope full eid IOP framework for EU MSs any eid technology

More information

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

CEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam

CEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam CEF eid SMO The use of eid in ehealth ehealth Network meeting 7 June 2016 Amsterdam Agenda Introduction to the study Introduction to eidas Regulation and CEF eid Identification/ authentication for ehealth

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

Placement Administration and Support System (PASS) User Guide. System Version January 2018 (v9)

Placement Administration and Support System (PASS) User Guide. System Version January 2018 (v9) Placement Administration and Support System (PASS) User Guide System Version 2.0 22 January 2018 (v9) Placement Administration and Support System (PASS) User Guide System Version 2.0 22 January 2018 Contents

More information

Cyber Partnership Blueprint: An Outline

Cyber Partnership Blueprint: An Outline Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

BSI-PP for. Protection Profile Waste Bin Identification Systems (WBIS-PP) Version developed by. Deutscher Städte- und Gemeindenbund

BSI-PP for. Protection Profile Waste Bin Identification Systems (WBIS-PP) Version developed by. Deutscher Städte- und Gemeindenbund Bundesamt für Sicherheit in der Informationstechnik BSI-PP-0010-2004 for Protection Profile Waste Bin Identification Systems (WBIS-PP) Version 1.04 developed by Deutscher Städte- und Gemeindenbund - Bundesamt

More information

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister Table of contents 1 2 3 4 5 Status eidas Regulation and CEN TC 224 in the contect of the Cyber

More information

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Managing Your Privileged Identities: The Choke Point of Advanced Attacks Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why

More information

E-Energy! Information and Communications Technologies for the Energy Sector

E-Energy! Information and Communications Technologies for the Energy Sector E-Energy! Information and Communications Technologies for the Energy Sector Conference of the European Commission Brussels, 31 January 2008 Dr. Andreas Goerdeler Head of the Division Development of Convergent

More information