CEN TC 224 WG15. European Citizen Card. Brussels May 10th CEN/TC 224 WG15 European Citizen Card
|
|
- Sheryl Johnston
- 5 years ago
- Views:
Transcription
1 CEN TC 224 WG15 European Citizen Card Brussels May 10th CEN/TC 224 WG15 European Citizen Card
2 European Citizen Card Scope Smart-Card based model for e-id management User-centric: Card under control of the citizen only Interoperability based on Middleware/ Open Interfaces Strong Authentication and Privacy Enhancement key features Compliant with EU Directive on Electronic Signature Political Objective not only technical : EU requires common citizenship symbols 2
3 European Citizen Card Category Multi-part European Standard in two steps Experimental Standard first European EN Standard in a second phase Implements the Authentication Layer of an e-idm system Authentication based on Smart Card + Middleware Makes smart card security services available to external applications Specifies: Complete Smart Card specification, covering physical, electrical and security services Middleware Specification of Implementation Card profiles around a main service ( ICAO traveling card, National ID card, e-government card ) 3
4 Target: Card-based Security and Data Protection Policies e-government access requires a security policy to be implemented The ECC supports the Identification, Authentication and Digital Signature services required by any security policy Cryptographic Protocols assume that both communicating ends are secure. This is an assumption to be prooved using authentication Privacy also requires the strong authentication of the entities exchanging sensitive personal data Authentication is the key element for security policy It is only when both entities trust each other s identity that the retrieval of sensitive personal data is possible 4
5 Target: Card-based Security and Data Protection Policies The ECC authenticates an e-government Server, protecting the citizen The ECC authenticates itself to an e-government Server: Only the legitimate citizen is authorized to consult his personal record in the Server After this mutual authentication a secure channel may be established and the citizen personal data may be retrieved in a secure way The ECC is the watchdog controlling access to personal data The ECC supports a digital signature generation compliant with the terms of the European Directive 1999/93 5
6 Target: Keep Legacy through ECC Middleware The middleware hides the specific details and technology of the European Citizen Card to the external world No previous knowledge of the ECC technology is needed to create a new application Service Providers does not need to know about the card implementation: The middleware takes care The ECC middleware facilitates the coexistence of ECC with other cards enabling the migration to a common EU approach 6
7 Target: Exporting European Technology CEN TC224 WG15 is a consensual committee between EU national standards bodies Simultaneously, the European Citizen Card interoperability mechanisms are being integrated in ISO Standards This process is being done with US and Japanese industry That strategy appears efficient to consolidate the european leadership position in the Security Industry 7
8 Approach: e-id Interoperability using the ECC The Interoperability is achieved with 3 key features: A common set of card commands and data structures specified in the European Citizen Card standard part 2 A middleware which makes any ECC look the same for the external world defined in part 3 The definition of ECC profiles: e-government card, National ID card, Traveling ICAO card defined in part 4 8
9 MF MF EF.ATR EF.DIR EF.SN EF.ATR EF.DIR DF ESIGN EF.ARR EF.C.CH. AUT EF.C.CH. DS EF.C.CH. ENC EF.C.ICC. AUT EF.DM DF SIG DF eid EF.ARR EF.C.CH. AUT EF.C.CH. QES EF.C.ICC. AUT EF.DM DF QES EF.ARR EF.C.CH. QES DF ICAO DF CIA DF CIA DF.CIA (ISO ) On-Card Application EF.DIR ACD DF.CIA (ISO ) On-Card Application EF.DIR ACD France e-government ECC Application DF.CIA Data for Middleware EF.DIR List of Applications + ECC profile ACD Compliance with ISO Spain e-government ECC Application DF.CIA Data for Middleware EF.DIR List of Applications + ECC profile ACD Compliance with ISO 24727
10 Integrating the ECC into e-idm systems The ECC is integrated in an e-idm system through a Middleware Stack This standard middleware presents two interfaces: An Open Interface ( or API) that enables an e-government application to connect with the middleware and to request a service A Card Interface that connects the middleware with the ECC The Authentication Layer of the e-idm system is implemented using an ECC + Middleware This Authentication Layer appears to the Service Provider just as an Open Interface This makes the ECC standard easily compatible with any Federated Identity Management solution 10
11 Interoperability T=0: The middleware and the ECC behave the same Service Provider Data Specific France ECC DF. CIA EF. DIR ACD / CCD ID Provider ( Gov CA) Identification Layer Authentication Layer Middleware Open Interface Commands and responses described in the ECC part 3 standard Open Interface Card Interface DF.CIA (ISO ) On-Card Application EF.DIR ACD DF.CIA (ISO ) On-Card Application EF.DIR ACD Data Specific Spain ECC DF. CIA EF. DIR ACD / CCD 11
12 Interoperability (II) 1. The Middleware now adapts to the specificities of ECC A and ECC B 2. From the Identification Layer, both ECC look identical Service Provider ID Provider ( Gov CA) Identification Layer Interface Commands and responses described on ECC part 3 standard Middleware adapted to A Authentication Layer Middleware adapted to B Middleware DF.CIA (ISO ) On-Card Application EF.DIR ACD DF.CIA (ISO ) On-Card Application EF.DIR ACD Card Commands and responses described on ECC part 2 standard 12
13 ECC interoperability scheme: Case 1 Identification Layer Client application Service Provider 1: Get ID Request 4 5: Auth ECC 6: Auth Resp Request Standard API Connection/Discovery Services Authentication Services Middleware Libraries: API request into ECC APDU Middleware Card Instruction Layer (Native APDU generation) Middleware Stack 3 2: APDU Get 7: APDU Auth 8: APDU Resp ECC Compliant Card Card Interface Authentication Layer 13
14 ECC interoperability scheme: Case 2 Identification Layer Client application Service Provider 10: ID OK 5: Verify ID e-id Issuer 1: Get ID Request 4 6: Auth ECC Request 9: Auth Resp Standard API Connection/Discovery Services Authentication Services Middleware Libraries: API request into ECC APDU Middleware Card Instruction Layer (Native APDU generation) Middleware Stack 3 2: APDU Get 7: APDU Auth 8: APDU Resp ECC Compliant Card Card Interface Authentication Layer 14
15 European Citizen Card Pro s First European Standard focused on Public Administrations Powerful discovery mechanism based on ISO open standard Industry-led effort : Multi-sourcing Complementarity with e-idm schemes Effective security provided to any e-idm Societal aspects considered: Privacy and e-inclusion Enables transition from existing schemes 15
16 European Citizen Card Con s Client applications must comply with Middleware API requirements On-going standard-setting process Lack of implementation Other e-id card-based schemes deployed Lack of visibility in relation with endorsement by governments 16
17 Relations with other models Accomodates naturally of any e-idm scheme based on middeware ( eg, TLS) Provide Authentication services to any e-idm scheme made up of an ID Agent- ID Provider and Service Provider Federation 17
18 Background slides 18 CEN/TC 224 WG15 European Citizen Card
19 ECC part 3 : Interoperability framework Country/end-users community A (not-on-us) Country/end-users community B (on-us) Foreign Public Administration or not-on-us smart card community 2 Home Member state Identity Provider Client RADIUS Network Access Server(optional) 4 5a IOP#3 Home PC 1 IOP#4 5b Browser embedded client-application (ActiveX Object, applet) Generic request interpreter 3 Server RADIUS (optional) Identification database, LDAP Directory etc End-user IOP#2 IOP#1 Middleware specific to country or smart card community Middleware libraries 19 ECC-2 compliant card, ISO/IEC compliant card
20 ISO / CEN complementarities CEN TC224 ISO SC17 Cards ISO SC27 Security ISO SC37 Biometrics WG15 ECC ISO 7816, ISO ISO Match on Card e-id Management ISO ISO WG16 esign ISO ISO 9796, 9797, 9798 ISO ISO ISO WG17 PP ISO cc 3.0 CEN TC 251 ehealth ISO e-id Management 20
21 Accreditation following national law IDP1 IDP2 TTP e-id1 e-id2 Reg1 Reg2 e-id Credential Validated [1] SP Initiates Identification Validate [ e-id ] DF.CIA (ISO ) On-Card Application EF.DIR ACD [2] ECC sends e-id response challenge Service Provider Certificate Recipient Recoverable data (Access Control List, Credentials, Data Sets for IOP) European Citizen Card Middleware 21
European Citizen Card Going ahead
1 European Citizen Card Going ahead Lorenzo Gaston CEN TC224 WG15 European Citizen Card Scope Smart-Card based model for e-id management User-centric: Card under control of the citizen only Interoperability
More informationISO/ CEN Standardization Status European Citizen Card Lorenzo Gaston
ISO/ CEN Standardization Status European Citizen Card Lorenzo Gaston ETSI 16 th -17 th Jan 2007 CEN/ TC224 WG15 European Citizen Card Standardization of ID cards for Public Administration, including but
More informationSmartCards as electronic signature devices Progress of standardization. Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany
SmartCards as electronic signature devices Progress of standardization Helmut Scherzer, CEN TC224/WG16 (Editor) IBM Germany scherzer@de.ibm.com Active CEN working groups(today) TC224 : "Machine readable
More informationTLS-Federation. Dr. Bud P. Bruegger. Dr. Detlef HühnleinH. Prof. Guido Marinelli. U.Rome Tor Vergata (Italy) Comune di Grosseto (Italy)
TLS-Federation Dr. Bud P. Bruegger Dr. Detlef HühnleinH Prof. Guido Marinelli Comune di Grosseto (Italy) Secunet (Germany) U.Rome Tor Vergata (Italy) Scope full eid IOP framework for EU MSs any eid technology
More informationStatus update. ISO/IEC 24727: Identification Cards Integrated Circuit Cards Programming Interface. 18 April 2006 Bill MacGregor U.S.
Status update ISO/IEC 24727: Identification Cards Integrated Circuit Cards Programming Interface 18 April 2006 Bill MacGregor U.S. Dept of Commerce ISO/IEC 24727 multi-part standard ISO/IEC 24727 Identification
More informationeidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister
eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister Table of contents 1 2 3 4 5 Status eidas Regulation and CEN TC 224 in the contect of the Cyber
More informationeid Interoperability for PEGS WS-Federation
eid Interoperability for PEGS WS-Federation Workshop Brussels 10 May 2007 Agenda 1 Scope 2 Category 3 Approach and description 4 Relevance for eid Interoperability 5 Pro s and Con s 6 Relationship with
More informationTechnical report. Signature creation and administration for eidas token Part 1: Functional Specification
Technical report Signature creation and administration for eidas token Part 1: Functional Specification Version 1.0 Date: 2015/07/21 Page 1 Foreword This technical report specifies an autonomous signature
More informationPKCS #15: Conformance Profile Specification
Table of Contents PKCS #15: Conformance Profile Specification RSA Laboratories August 1, 2000 1 INTRODUCTION... 2 1 REFERENCES AND RELATED DOCUMENTS... 2 2 DEFINITIONS... 2 3 SYMBOLS AND ABBREVIATIONS...
More informationU.S. E-Authentication Interoperability Lab Engineer
Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré
More informationTechnical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token
Technical Guideline TR-03130-3 eid-server Part 3: eidas-middleware-service for eidas-token Version 1.0 5. May 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationThis document is a preview generated by EVS
TECHNICAL SPECIFICATION SPÉCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CEN/TS 15480-3 December 2010 ICS 35.240.15 English Version Identification card systems - European Citizen Card - Part 3: European
More information1. Publishable Summary
1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,
More informationIdentity and capability management and federation
Identity and capability management and federation The need to manage identities - 1 Increment of digital identity complexity Password, dynamic password, one-time password, based on portable secure devices
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationcryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH
cryptovision s Government Solutions Adam Ross, Ben Drisch cryptovision GmbH cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 cryptovision cryptovision Gelsenkirchen
More informationEU Passport Specification
Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the
More informationCEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
More informationLegal Regulations and Vulnerability Analysis
Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information
More informationUpdate on Security, Privacy and Safety Standards
, January 7-12, 2007, San Diego, CA Update on Security, Privacy and Safety Standards HL7 Germany Aspects of Protection and Security after C. Laske Security of personal data (data protection) Protection
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationFuture Expansion for emrtd PKI Mark Joynes, Entrust
Future Expansion for emrtd PKI Mark Joynes, Entrust 2013 MRTD Symposium 1 What are we trying to achieve Prevent: Production of credible false documents Tampering with legitimate documents Breach of sovereignty
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationPKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore
PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even
More informationElectronic ID at work: issues and perspective
Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":
More informationElectronic Commerce Working Group report
RESTRICTED CEFACT/ECAWG/97N012 4 December 1997 Electronic Commerce Ad hoc Working Group (ECAWG) Electronic Commerce Working Group report SOURCE: 10 th ICT Standards Board, Sophia Antipolis, 4 th November
More informationSTORK PRESENTATION 07/04/2009. Frank LEYMAN. Manager International Relations. Stork is an EU co-funded project INFSO-ICT-PSP
STORK PRESENTATION Frank LEYMAN Manager International Relations 07/04/2009 Stork is an EU co-funded project INFSO-ICT-PSP-224993 egovernment objectives (ICT-PSP call 2007) STORK To simplify administrative
More informationTrust Services for Electronic Transactions
Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg
More informationJTC 1 SC 37 Biometrics International Standards
JTC 1 SC 37 Biometrics International Standards Dr. Stephen Elliott Biometrics Standards, Performance, and Assurance Laboratory Purdue University www.bspalabs.org Overview Market Opportunities for Biometric
More informationOpen Smart Card Infrastructure for Europe
Open Smart Card Infrastructure for Europe v2 Volume 3: Part 3: Authors: Global Interoperability Framework for identification, authentication and electronic signature (IAS) with smart cards Recommendations
More informationThis document is a preview generated by EVS
CEN WORKSHOP CWA 15264-1 April 2005 AGREEMENT ICS 35.240.15 English version Architecture for a European interoperable eid system within a smart card infrastructure This CEN Workshop Agreement has been
More informationCan eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010
Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security
More informationSSL/TSL EV Certificates
SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo
More informationTechnical Overview. Version March 2018 Author: Vittorio Bertola
Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which
More informationEstablishing Trust Across International Communities
Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.
More informationFederated Access. Identity & Privacy Protection
Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation
More informationGSMA Embedded SIM for Connected Cars
GSMA Embedded SIM for Connected Cars C-ITS ronde tafel Security 10 mei 2016 Arjan Geluk UL Software & Security UL and the UL logo are trademarks of UL LLC 2016 1 Arjan Geluk - bio Principal Advisor, Software
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More informationTS V1.3.2 ( )
Technical Specification Identification card systems; Telecommunications IC cards and terminals; Part 3: Application independent card requirements 2 Reference RTS/PTS-00013 (b60r0j1f.pdf) Keywords card
More informationElectronic signature framework
R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents
More informationSéminaire sur la Certification Electronique
Séminaire sur la Certification Electronique Algiers Algeria, 8-9 December, 2009 International Telecommunication Arab Regional Office Assisting Governments in Developing e-commerce Ecosystems: A Synthesis
More informationeidas Regulation (EU) 910/2014 eidas implementation State of Play
eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationSAT for eid [EIRA extension]
SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration
More informationResilience, Deterrence and Defence: Building strong cybersecurity for the EU
Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy
More informationstandards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in
ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the
More informationVMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1
VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationIrish Standard I.S. EN :2014
Irish Standard I.S. EN 419212-2:2014 Application Interface for smart cards used as Secure Signature Creation Devices - Part 2: Additional services CEN 2014 No copying without NSAI permission except as
More informationIdentity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID
Identity Ecosystem Design challenges Wim Coulier eidas Expert Belgian Mobile ID Belgian Mobile ID respects the guidelines provided by is the reference for digital identification and authentication in Belgium
More informationThe appendix to the certificate is part of the certificate and consists of 3 pages.
The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company SK ID Solutions AS Pärnu avenue 141 11314 Tallinn, Estonia to confirm that its trust service EID-SK
More informationeidas Interoperability Architecture Version November 2015
eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability
More informationEvolution in cross-border interoperability of esignatures and eid. Tarvi Martens SK, Estonia
Evolution in cross-border interoperability of esignatures and eid Tarvi Martens SK, Estonia Let s read the title again! Evolution in cross-border interoperability of esignatures and eid Prerequisites:
More informationTrusted National Identity Schemes. Coralie MESNARD
Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens
More informationSG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid
SG-CG/SGIS ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid Page 1 CEN/CENELEC/ETSI Smart Grid Co-ordination Group CEN-CENELEC-ETSI 2011 European
More informationGlobal estandards and Web Architectures for egovernment projects José M. Alonso,
Global estandards and Web Architectures for egovernment projects José M. Alonso, egovernment and W3C José M. Alonso CTIC Fellow - W3C egovernment Lead Technology and Society Domain 28 May
More informationeid Interoperability for PEGS Report on interoperable eid Management technical solutions
Report on interoperable eid Management technical solutions This report / paper was prepared for the IDABC programme by: Author s name: Jarkko Majava, Siemens; Andrea Biasiol, Siemens; Anthony van der Maren,
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationOlli Jussila Adaptive R&D TeliaSonera
Olli Jussila Adaptive R&D TeliaSonera Agenda TeliaSonera at a glance Project presentation Technical results Business model and actor benefits End user experience Dissemination activities Conclusion 23/02/07
More informationITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation?
ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? Patrick Curry OBE CEng Director, BBFA: patrick.curry@bbfa.info Director, Kyckr; patrick.curry@kyckr.com
More informationAWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card
AWARD Speed Accuracy Interoperability TOP PERFORMER PRODUCT SHEET Minex III FpVTE PFT II FRVT Match on Card Secure fingerprint verification directly on the card WWW.INNOVATRICS.COM MATCH ON CARD Our solution
More informatione SENS Pilots of eid, esignatures and Trusted Services
e SENS Electronic Simple European Networked Services Trust in the Digital World Madrid, February 26 th, 2015 e SENS Pilots of eid, esignatures and Trusted Services Lefteris Leontaridis, e SENS Piloting
More informationOverview of cryptovision's eid Product Offering. Presentation & Demo
Presentation & Demo Benjamin Drisch, Adam Ross cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 General Requirements Government of Utopia Utopia Electronic
More informationIntegrating VMware Workspace ONE with Okta. VMware Workspace ONE
Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationNIS Platform Working Group 3 Individuals Digital Rights and Capabilities. Dr. Gisela Meister April
NIS Platform Working Group 3 Individuals Digital Rights and Capabilities Dr. Gisela Meister April 08-2014 AoI 1: Individuals Digital Rights and Capabilities AoI 1 s vision is that individuals needs and
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation
More informationXenApp 5 Security Standards and Deployment Scenarios
XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards
More informationNovell Access Manager 3.1
Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete
More informationUnited4Health session Regulatory Framework Trends & Updates. Nicole Denjoy COCIR Secretary General Wed. 7 May 2014, Berlin (Germany)
United4Health session Regulatory Framework Trends & Updates Nicole Denjoy COCIR Secretary General Wed. 7 May 2014, Berlin (Germany) Outline 1. What is COCIR? 2. COCIR s vision on ehealth 3. Overview on
More informationAir Transport & Travel Industry. Principles, Functional and Business Requirements PNRGOV
Air Transport & Travel Industry Principles, Functional and Business Requirements Version 15.1 Endorsed by WCO Council in July 2016 Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 SCOPE... 3
More informationGlobalPlatform Addressing Unique Security Challenges through Standardization
GlobalPlatform Addressing Unique Security Challenges through Standardization @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatformTV Our Program Today GlobalPlatform and Identity Task
More informationInformation technology Security techniques Telebiometric authentication framework using biometric hardware security module
INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationBiometrics & Smart Cards In Use Today
Biometrics & Smart Cards In Use Today Christer Bergman President and CEO, Precise Biometrics In Use Today... Alan L. Herto Chief, Systems Integrity Division Requirements Improved IT security & stronger
More informationThis presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.
Privacy, Trust, and the General Data Protection Regulation (GDPR) Robertas Tamosaitis Microsoft Business Solution Sales Specialist E-mail: rtamosa@microsoft.com This presentation is intended to provide
More informationThe Open Protocol for Access Control Identification and Ticketing with PrivacY
The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY
More informationCREDENTSYS CARD FAMILY
CREDENTSYS CARD FAMILY Credentsys is a secure smart card family that is designed for national ID systems, passports, and multi-use enterprise security environments. The family is certified to FIPS 140-2
More informationPaul A. Karger
Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of
More informationCAN MICROSOFT HELP MEET THE GDPR
CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com
More informationERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford
Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More informationComparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition
Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,
More informationRECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO
July 2017 Contents Introduction...3 The Integrated Solution...3 Prerequisites...4 Configuration...4 Set up BIG-IP APM to be a SAML IdP...4 Create a self-signed certificate for signing SAML assertions...4
More informationAssuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09
Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance
More information@firma, Validation Platform for PKIs
@firma, Validation Platform for PKIs Miguel Álvarez Rodríguez Ministry of Public Administration of Spain Brussels, 13 th November 2008 Current national scenario on eid PKI digital certificates are the
More informationGuide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE
Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationElectronic and digital signatures in Adobe Sign for government.
Electronic and digital signatures in Adobe Sign for government. Adobe Sign lets you comply with local and international regulations using one scalable signature solution. A White Paper September 2017 TABLE
More informationResearch resources and standardization : in the digital age
Research resources and standardization : in the digital age Akira MIYAZAWA Prof. emeritus NII 2018-09-13 2018 EAJRS 1 books documents artworks statistical data experiment data journal articles Research
More informationMUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan
MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates
ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates Getting Prepared Print these instructions for easy reference. (Note: this is a good test to see that you are able to
More information2 Electronic Passports and Identity Cards
2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional
More informationIBM i Version 7.2. Security Digital Certificate Manager IBM
IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
More informationThe epassport: What s Next?
The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security
More informationNew CEN-CENELEC Technical Committees for Infosec and Data Protection Standardization (TC8) Brussels - 19 September 2017 Alessandro GUARINO Chair,
New CEN-CENELEC Technical Committees for Infosec and Data Protection Standardization (TC8) Brussels - 19 September 2017 Alessandro GUARINO Chair, CEN/CENELEC/TC 8 Privacy Management in Products and Services
More information