CEN TC 224 WG15. European Citizen Card. Brussels May 10th CEN/TC 224 WG15 European Citizen Card

Size: px
Start display at page:

Download "CEN TC 224 WG15. European Citizen Card. Brussels May 10th CEN/TC 224 WG15 European Citizen Card"

Transcription

1 CEN TC 224 WG15 European Citizen Card Brussels May 10th CEN/TC 224 WG15 European Citizen Card

2 European Citizen Card Scope Smart-Card based model for e-id management User-centric: Card under control of the citizen only Interoperability based on Middleware/ Open Interfaces Strong Authentication and Privacy Enhancement key features Compliant with EU Directive on Electronic Signature Political Objective not only technical : EU requires common citizenship symbols 2

3 European Citizen Card Category Multi-part European Standard in two steps Experimental Standard first European EN Standard in a second phase Implements the Authentication Layer of an e-idm system Authentication based on Smart Card + Middleware Makes smart card security services available to external applications Specifies: Complete Smart Card specification, covering physical, electrical and security services Middleware Specification of Implementation Card profiles around a main service ( ICAO traveling card, National ID card, e-government card ) 3

4 Target: Card-based Security and Data Protection Policies e-government access requires a security policy to be implemented The ECC supports the Identification, Authentication and Digital Signature services required by any security policy Cryptographic Protocols assume that both communicating ends are secure. This is an assumption to be prooved using authentication Privacy also requires the strong authentication of the entities exchanging sensitive personal data Authentication is the key element for security policy It is only when both entities trust each other s identity that the retrieval of sensitive personal data is possible 4

5 Target: Card-based Security and Data Protection Policies The ECC authenticates an e-government Server, protecting the citizen The ECC authenticates itself to an e-government Server: Only the legitimate citizen is authorized to consult his personal record in the Server After this mutual authentication a secure channel may be established and the citizen personal data may be retrieved in a secure way The ECC is the watchdog controlling access to personal data The ECC supports a digital signature generation compliant with the terms of the European Directive 1999/93 5

6 Target: Keep Legacy through ECC Middleware The middleware hides the specific details and technology of the European Citizen Card to the external world No previous knowledge of the ECC technology is needed to create a new application Service Providers does not need to know about the card implementation: The middleware takes care The ECC middleware facilitates the coexistence of ECC with other cards enabling the migration to a common EU approach 6

7 Target: Exporting European Technology CEN TC224 WG15 is a consensual committee between EU national standards bodies Simultaneously, the European Citizen Card interoperability mechanisms are being integrated in ISO Standards This process is being done with US and Japanese industry That strategy appears efficient to consolidate the european leadership position in the Security Industry 7

8 Approach: e-id Interoperability using the ECC The Interoperability is achieved with 3 key features: A common set of card commands and data structures specified in the European Citizen Card standard part 2 A middleware which makes any ECC look the same for the external world defined in part 3 The definition of ECC profiles: e-government card, National ID card, Traveling ICAO card defined in part 4 8

9 MF MF EF.ATR EF.DIR EF.SN EF.ATR EF.DIR DF ESIGN EF.ARR EF.C.CH. AUT EF.C.CH. DS EF.C.CH. ENC EF.C.ICC. AUT EF.DM DF SIG DF eid EF.ARR EF.C.CH. AUT EF.C.CH. QES EF.C.ICC. AUT EF.DM DF QES EF.ARR EF.C.CH. QES DF ICAO DF CIA DF CIA DF.CIA (ISO ) On-Card Application EF.DIR ACD DF.CIA (ISO ) On-Card Application EF.DIR ACD France e-government ECC Application DF.CIA Data for Middleware EF.DIR List of Applications + ECC profile ACD Compliance with ISO Spain e-government ECC Application DF.CIA Data for Middleware EF.DIR List of Applications + ECC profile ACD Compliance with ISO 24727

10 Integrating the ECC into e-idm systems The ECC is integrated in an e-idm system through a Middleware Stack This standard middleware presents two interfaces: An Open Interface ( or API) that enables an e-government application to connect with the middleware and to request a service A Card Interface that connects the middleware with the ECC The Authentication Layer of the e-idm system is implemented using an ECC + Middleware This Authentication Layer appears to the Service Provider just as an Open Interface This makes the ECC standard easily compatible with any Federated Identity Management solution 10

11 Interoperability T=0: The middleware and the ECC behave the same Service Provider Data Specific France ECC DF. CIA EF. DIR ACD / CCD ID Provider ( Gov CA) Identification Layer Authentication Layer Middleware Open Interface Commands and responses described in the ECC part 3 standard Open Interface Card Interface DF.CIA (ISO ) On-Card Application EF.DIR ACD DF.CIA (ISO ) On-Card Application EF.DIR ACD Data Specific Spain ECC DF. CIA EF. DIR ACD / CCD 11

12 Interoperability (II) 1. The Middleware now adapts to the specificities of ECC A and ECC B 2. From the Identification Layer, both ECC look identical Service Provider ID Provider ( Gov CA) Identification Layer Interface Commands and responses described on ECC part 3 standard Middleware adapted to A Authentication Layer Middleware adapted to B Middleware DF.CIA (ISO ) On-Card Application EF.DIR ACD DF.CIA (ISO ) On-Card Application EF.DIR ACD Card Commands and responses described on ECC part 2 standard 12

13 ECC interoperability scheme: Case 1 Identification Layer Client application Service Provider 1: Get ID Request 4 5: Auth ECC 6: Auth Resp Request Standard API Connection/Discovery Services Authentication Services Middleware Libraries: API request into ECC APDU Middleware Card Instruction Layer (Native APDU generation) Middleware Stack 3 2: APDU Get 7: APDU Auth 8: APDU Resp ECC Compliant Card Card Interface Authentication Layer 13

14 ECC interoperability scheme: Case 2 Identification Layer Client application Service Provider 10: ID OK 5: Verify ID e-id Issuer 1: Get ID Request 4 6: Auth ECC Request 9: Auth Resp Standard API Connection/Discovery Services Authentication Services Middleware Libraries: API request into ECC APDU Middleware Card Instruction Layer (Native APDU generation) Middleware Stack 3 2: APDU Get 7: APDU Auth 8: APDU Resp ECC Compliant Card Card Interface Authentication Layer 14

15 European Citizen Card Pro s First European Standard focused on Public Administrations Powerful discovery mechanism based on ISO open standard Industry-led effort : Multi-sourcing Complementarity with e-idm schemes Effective security provided to any e-idm Societal aspects considered: Privacy and e-inclusion Enables transition from existing schemes 15

16 European Citizen Card Con s Client applications must comply with Middleware API requirements On-going standard-setting process Lack of implementation Other e-id card-based schemes deployed Lack of visibility in relation with endorsement by governments 16

17 Relations with other models Accomodates naturally of any e-idm scheme based on middeware ( eg, TLS) Provide Authentication services to any e-idm scheme made up of an ID Agent- ID Provider and Service Provider Federation 17

18 Background slides 18 CEN/TC 224 WG15 European Citizen Card

19 ECC part 3 : Interoperability framework Country/end-users community A (not-on-us) Country/end-users community B (on-us) Foreign Public Administration or not-on-us smart card community 2 Home Member state Identity Provider Client RADIUS Network Access Server(optional) 4 5a IOP#3 Home PC 1 IOP#4 5b Browser embedded client-application (ActiveX Object, applet) Generic request interpreter 3 Server RADIUS (optional) Identification database, LDAP Directory etc End-user IOP#2 IOP#1 Middleware specific to country or smart card community Middleware libraries 19 ECC-2 compliant card, ISO/IEC compliant card

20 ISO / CEN complementarities CEN TC224 ISO SC17 Cards ISO SC27 Security ISO SC37 Biometrics WG15 ECC ISO 7816, ISO ISO Match on Card e-id Management ISO ISO WG16 esign ISO ISO 9796, 9797, 9798 ISO ISO ISO WG17 PP ISO cc 3.0 CEN TC 251 ehealth ISO e-id Management 20

21 Accreditation following national law IDP1 IDP2 TTP e-id1 e-id2 Reg1 Reg2 e-id Credential Validated [1] SP Initiates Identification Validate [ e-id ] DF.CIA (ISO ) On-Card Application EF.DIR ACD [2] ECC sends e-id response challenge Service Provider Certificate Recipient Recoverable data (Access Control List, Credentials, Data Sets for IOP) European Citizen Card Middleware 21

European Citizen Card Going ahead

European Citizen Card Going ahead 1 European Citizen Card Going ahead Lorenzo Gaston CEN TC224 WG15 European Citizen Card Scope Smart-Card based model for e-id management User-centric: Card under control of the citizen only Interoperability

More information

ISO/ CEN Standardization Status European Citizen Card Lorenzo Gaston

ISO/ CEN Standardization Status European Citizen Card Lorenzo Gaston ISO/ CEN Standardization Status European Citizen Card Lorenzo Gaston ETSI 16 th -17 th Jan 2007 CEN/ TC224 WG15 European Citizen Card Standardization of ID cards for Public Administration, including but

More information

SmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany

SmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany SmartCards as electronic signature devices Progress of standardization Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany scherzer@de.ibm.com Active CEN working groups(today) TC224 : "Machine readable

More information

TLS-Federation. Dr. Bud P. Bruegger. Dr. Detlef HühnleinH. Prof. Guido Marinelli. U.Rome Tor Vergata (Italy) Comune di Grosseto (Italy)

TLS-Federation. Dr. Bud P. Bruegger. Dr. Detlef HühnleinH. Prof. Guido Marinelli. U.Rome Tor Vergata (Italy) Comune di Grosseto (Italy) TLS-Federation Dr. Bud P. Bruegger Dr. Detlef HühnleinH Prof. Guido Marinelli Comune di Grosseto (Italy) Secunet (Germany) U.Rome Tor Vergata (Italy) Scope full eid IOP framework for EU MSs any eid technology

More information

Status update. ISO/IEC 24727: Identification Cards Integrated Circuit Cards Programming Interface. 18 April 2006 Bill MacGregor U.S.

Status update. ISO/IEC 24727: Identification Cards Integrated Circuit Cards Programming Interface. 18 April 2006 Bill MacGregor U.S. Status update ISO/IEC 24727: Identification Cards Integrated Circuit Cards Programming Interface 18 April 2006 Bill MacGregor U.S. Dept of Commerce ISO/IEC 24727 multi-part standard ISO/IEC 24727 Identification

More information

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister Table of contents 1 2 3 4 5 Status eidas Regulation and CEN TC 224 in the contect of the Cyber

More information

eid Interoperability for PEGS WS-Federation

eid Interoperability for PEGS WS-Federation eid Interoperability for PEGS WS-Federation Workshop Brussels 10 May 2007 Agenda 1 Scope 2 Category 3 Approach and description 4 Relevance for eid Interoperability 5 Pro s and Con s 6 Relationship with

More information

Technical report. Signature creation and administration for eidas token Part 1: Functional Specification

Technical report. Signature creation and administration for eidas token Part 1: Functional Specification Technical report Signature creation and administration for eidas token Part 1: Functional Specification Version 1.0 Date: 2015/07/21 Page 1 Foreword This technical report specifies an autonomous signature

More information

PKCS #15: Conformance Profile Specification

PKCS #15: Conformance Profile Specification Table of Contents PKCS #15: Conformance Profile Specification RSA Laboratories August 1, 2000 1 INTRODUCTION... 2 1 REFERENCES AND RELATED DOCUMENTS... 2 2 DEFINITIONS... 2 3 SYMBOLS AND ABBREVIATIONS...

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré

More information

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token Technical Guideline TR-03130-3 eid-server Part 3: eidas-middleware-service for eidas-token Version 1.0 5. May 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899

More information

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security

More information

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL SPECIFICATION SPÉCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CEN/TS 15480-3 December 2010 ICS 35.240.15 English Version Identification card systems - European Citizen Card - Part 3: European

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

Identity and capability management and federation

Identity and capability management and federation Identity and capability management and federation The need to manage identities - 1 Increment of digital identity complexity Password, dynamic password, one-time password, based on portable secure devices

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH

cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen

More information

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

Update on Security, Privacy and Safety Standards

Update on Security, Privacy and Safety Standards , January 7-12, 2007, San Diego, CA Update on Security, Privacy and Safety Standards HL7 Germany Aspects of Protection and Security after C. Laske Security of personal data (data protection) Protection

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

Future Expansion for emrtd PKI Mark Joynes, Entrust

Future Expansion for emrtd PKI Mark Joynes, Entrust Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even

More information

Electronic ID at work: issues and perspective

Electronic ID at work: issues and perspective Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":

More information

Electronic Commerce Working Group report

Electronic Commerce Working Group report RESTRICTED CEFACT/ECAWG/97N012 4 December 1997 Electronic Commerce Ad hoc Working Group (ECAWG) Electronic Commerce Working Group report SOURCE: 10 th ICT Standards Board, Sophia Antipolis, 4 th November

More information

STORK PRESENTATION 07/04/2009. Frank LEYMAN. Manager International Relations. Stork is an EU co-funded project INFSO-ICT-PSP

STORK PRESENTATION 07/04/2009. Frank LEYMAN. Manager International Relations. Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION Frank LEYMAN Manager International Relations 07/04/2009 Stork is an EU co-funded project INFSO-ICT-PSP-224993 egovernment objectives (ICT-PSP call 2007) STORK To simplify administrative

More information

Trust Services for Electronic Transactions

Trust Services for Electronic Transactions Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg

More information

JTC 1 SC 37 Biometrics International Standards

JTC 1 SC 37 Biometrics International Standards JTC 1 SC 37 Biometrics International Standards Dr. Stephen Elliott Biometrics Standards, Performance, and Assurance Laboratory Purdue University www.bspalabs.org Overview Market Opportunities for Biometric

More information

Open Smart Card Infrastructure for Europe

Open Smart Card Infrastructure for Europe Open Smart Card Infrastructure for Europe v2 Volume 3: Part 3: Authors: Global Interoperability Framework for identification, authentication and electronic signature (IAS) with smart cards Recommendations

More information

This document is a preview generated by EVS

This document is a preview generated by EVS CEN WORKSHOP CWA 15264-1 April 2005 AGREEMENT ICS 35.240.15 English version Architecture for a European interoperable eid system within a smart card infrastructure This CEN Workshop Agreement has been

More information

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security

More information

SSL/TSL EV Certificates

SSL/TSL EV Certificates SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

Establishing Trust Across International Communities

Establishing Trust Across International Communities Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.

More information

Federated Access. Identity & Privacy Protection

Federated Access. Identity & Privacy Protection Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation

More information

GSMA Embedded SIM for Connected Cars

GSMA Embedded SIM for Connected Cars GSMA Embedded SIM for Connected Cars C-ITS ronde tafel Security 10 mei 2016 Arjan Geluk UL Software & Security UL and the UL logo are trademarks of UL LLC 2016 1 Arjan Geluk - bio Principal Advisor, Software

More information

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart

More information

TS V1.3.2 ( )

TS V1.3.2 ( ) Technical Specification Identification card systems; Telecommunications IC cards and terminals; Part 3: Application independent card requirements 2 Reference RTS/PTS-00013 (b60r0j1f.pdf) Keywords card

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

Séminaire sur la Certification Electronique

Séminaire sur la Certification Electronique Séminaire sur la Certification Electronique Algiers Algeria, 8-9 December, 2009 International Telecommunication Arab Regional Office Assisting Governments in Developing e-commerce Ecosystems: A Synthesis

More information

eidas Regulation (EU) 910/2014 eidas implementation State of Play

eidas Regulation (EU) 910/2014 eidas implementation State of Play eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

SAT for eid [EIRA extension]

SAT for eid [EIRA extension] SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration

More information

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Irish Standard I.S. EN :2014

Irish Standard I.S. EN :2014 Irish Standard I.S. EN 419212-2:2014 Application Interface for smart cards used as Secure Signature Creation Devices - Part 2: Additional services CEN 2014 No copying without NSAI permission except as

More information

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID Identity Ecosystem Design challenges Wim Coulier eidas Expert Belgian Mobile ID Belgian Mobile ID respects the guidelines provided by is the reference for digital identification and authentication in Belgium

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company SK ID Solutions AS Pärnu avenue 141 11314 Tallinn, Estonia to confirm that its trust service EID-SK

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

Evolution in cross-border interoperability of esignatures and eid. Tarvi Martens SK, Estonia

Evolution in cross-border interoperability of esignatures and eid. Tarvi Martens SK, Estonia Evolution in cross-border interoperability of esignatures and eid Tarvi Martens SK, Estonia Let s read the title again! Evolution in cross-border interoperability of esignatures and eid Prerequisites:

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid SG-CG/SGIS ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid Page 1 CEN/CENELEC/ETSI Smart Grid Co-ordination Group CEN-CENELEC-ETSI 2011 European

More information

Global estandards and Web Architectures for egovernment projects José M. Alonso,

Global estandards and Web Architectures for egovernment projects José M. Alonso, Global estandards and Web Architectures for egovernment projects José M. Alonso, egovernment and W3C José M. Alonso CTIC Fellow - W3C egovernment Lead Technology and Society Domain 28 May

More information

eid Interoperability for PEGS Report on interoperable eid Management technical solutions

eid Interoperability for PEGS Report on interoperable eid Management technical solutions Report on interoperable eid Management technical solutions This report / paper was prepared for the IDABC programme by: Author s name: Jarkko Majava, Siemens; Andrea Biasiol, Siemens; Anthony van der Maren,

More information

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:

More information

Olli Jussila Adaptive R&D TeliaSonera

Olli Jussila Adaptive R&D TeliaSonera Olli Jussila Adaptive R&D TeliaSonera Agenda TeliaSonera at a glance Project presentation Technical results Business model and actor benefits End user experience Dissemination activities Conclusion 23/02/07

More information

ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation?

ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? Patrick Curry OBE CEng Director, BBFA: patrick.curry@bbfa.info Director, Kyckr; patrick.curry@kyckr.com

More information

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution

More information

e SENS Pilots of eid, esignatures and Trusted Services

e SENS Pilots of eid, esignatures and Trusted Services e SENS Electronic Simple European Networked Services Trust in the Digital World Madrid, February 26 th, 2015 e SENS Pilots of eid, esignatures and Trusted Services Lefteris Leontaridis, e SENS Piloting

More information

Overview of cryptovision's eid Product Offering. Presentation & Demo

Overview of cryptovision's eid Product Offering. Presentation & Demo Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic

More information

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

NIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April

NIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April NIS Platform Working Group 3 Individuals Digital Rights and Capabilities Dr. Gisela Meister April 08-2014 AoI 1: Individuals Digital Rights and Capabilities AoI 1 s vision is that individuals needs and

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

United4Health session Regulatory Framework Trends & Updates. Nicole Denjoy COCIR Secretary General Wed. 7 May 2014, Berlin (Germany)

United4Health session Regulatory Framework Trends & Updates. Nicole Denjoy COCIR Secretary General Wed. 7 May 2014, Berlin (Germany) United4Health session Regulatory Framework Trends & Updates Nicole Denjoy COCIR Secretary General Wed. 7 May 2014, Berlin (Germany) Outline 1. What is COCIR? 2. COCIR s vision on ehealth 3. Overview on

More information

Air Transport & Travel Industry. Principles, Functional and Business Requirements PNRGOV

Air Transport & Travel Industry. Principles, Functional and Business Requirements PNRGOV Air Transport & Travel Industry Principles, Functional and Business Requirements Version 15.1 Endorsed by WCO Council in July 2016 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 SCOPE... 3

More information

GlobalPlatform Addressing Unique Security Challenges through Standardization

GlobalPlatform Addressing Unique Security Challenges through Standardization GlobalPlatform Addressing Unique Security Challenges through Standardization @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatformTV Our Program Today GlobalPlatform and Identity Task

More information

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

Biometrics & Smart Cards In Use Today

Biometrics & Smart Cards In Use Today Biometrics & Smart Cards In Use Today Christer Bergman President and CEO, Precise Biometrics In Use Today... Alan L. Herto Chief, Systems Integrity Division Requirements Improved IT security & stronger

More information

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law. Privacy, Trust, and the General Data Protection Regulation (GDPR) Robertas Tamosaitis Microsoft Business Solution Sales Specialist E-mail: rtamosa@microsoft.com This presentation is intended to provide

More information

The Open Protocol for Access Control Identification and Ticketing with PrivacY

The Open Protocol for Access Control Identification and Ticketing with PrivacY The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY

More information

CREDENTSYS CARD FAMILY

CREDENTSYS CARD FAMILY CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2

More information

Paul A. Karger

Paul A. Karger Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in

More information

ASEAN e-authentication Workshop Balwinder Sahota

ASEAN e-authentication Workshop Balwinder Sahota ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO July 2017 Contents Introduction...3 The Integrated Solution...3 Prerequisites...4 Configuration...4 Set up BIG-IP APM to be a SAML IdP...4 Create a self-signed certificate for signing SAML assertions...4

More information

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09 Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance

More information

@firma, Validation Platform for PKIs

@firma, Validation Platform for PKIs @firma, Validation Platform for PKIs Miguel Álvarez Rodríguez Ministry of Public Administration of Spain Brussels, 13 th November 2008 Current national scenario on eid PKI digital certificates are the

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Electronic and digital signatures in Adobe Sign for government.

Electronic and digital signatures in Adobe Sign for government. Electronic and digital signatures in Adobe Sign for government. Adobe Sign lets you comply with local and international regulations using one scalable signature solution. A White Paper September 2017 TABLE

More information

Research resources and standardization : in the digital age

Research resources and standardization : in the digital age Research resources and standardization : in the digital age Akira MIYAZAWA Prof. emeritus NII 2018-09-13 2018 EAJRS 1 books documents artworks statistical data experiment data journal articles Research

More information

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates

ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates Getting Prepared Print these instructions for easy reference. (Note: this is a good test to see that you are able to

More information

2 Electronic Passports and Identity Cards

2 Electronic Passports and Identity Cards 2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

The epassport: What s Next?

The epassport: What s Next? The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security

More information

New CEN-CENELEC Technical Committees for Infosec and Data Protection Standardization (TC8) Brussels - 19 September 2017 Alessandro GUARINO Chair,

New CEN-CENELEC Technical Committees for Infosec and Data Protection Standardization (TC8) Brussels - 19 September 2017 Alessandro GUARINO Chair, New CEN-CENELEC Technical Committees for Infosec and Data Protection Standardization (TC8) Brussels - 19 September 2017 Alessandro GUARINO Chair, CEN/CENELEC/TC 8 Privacy Management in Products and Services

More information