Unique Identification Number Project

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Setting Processes for Electronic Signature 1 The ”W-SPES Project” and the “Leuven Report on the Electronic Signatures Directive” – Putting the Project.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Grid Security. Typical Grid Scenario Users Resources.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 10: Authentication Guide to Computer Network Security.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
Harmonisation of electronic Identities for the European Citizen Jan van Arkel, co- chair Porvoo group, May 11, 2006 Ljubljana.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Unit 1: Protection and Security for Grid Computing Part 2
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
European Electronic Identity Practices Country Update of Estonia Speaker: Ivar Jung Date:
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
Module 1 Version:1.3_ Release date:
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
Bulding blocks of e- government Ingmar Pappel. Bulding blocks of e-government  Personal Code  Digital Identity  Digital signature  X-Road  Organizations.
Information Systems Design and Development Security Precautions Computing Science.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
The Solution SSIVS.
Securing Information Systems
Smart Data infrastructure
Key management issues in PGP
Internet Governance in Nigeria:
ESign Aashutosh.
Grid Security.
Athina Antoniou and Lilian Mitrou
Data and Applications Security Developments and Directions
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Authentication.
Summary Physical Access & Time and Attendance PC/Network Access
Session 19. Digitizing civil registration and vital statistics
Session 12. Digitizing civil registration and vital statistics
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Legal Framework for Civil Registration, Vital Statistics
Regional Initiatives – South Asia Civil Registration Group (CR8)
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Session 12. Digitizing civil registration and vital statistics
E-identities (and e-signatures)
Presentation transcript:

Unique Identification Number Project

About SSN in USA Started in November 1936 Nine digit number issued to U.S Citizens, Permanent Residents and temporary residents under Social Security Act.  Skeleton of SSN is XXX-XX-XXXX Primary purpose is to track individuals for taxation purposes. Evolved to become a defacto national identification number in the recent years. MIT India Reading Group 7/3/2018

Challenges Faced in SSN Privacy Identity Theft Terror Related crimes Other issues MIT India Reading Group 7/3/2018

National ID in UK Challenges in Existing System: Purpose: Technical complexity of the scheme Associated cost Protecting Privacy of citizens Purpose: To maintain one identity document that can be used internally by all departments of Government. To avail better access to services provided by both public and private sectors. To track eligible workers in UK and to combat identity theft, Identity fraud and the issue of illegal immigrants. MIT India Reading Group 7/3/2018

National ID in Belgium BELPIC is the largest e-ID scheme in Europe Challenges and Solutions Goal was to enable citizens to authenticate themselves for accessing e-government applications like social security and give them a secure ID. Solution was based on a new PKI infrastructure along with information support and 24/7 helpdesk for lost cards. The framework relies on X.509v3 certificates. BELPIC doesn’t completely address the issue of interoperability across administrative units. Takeaways – Use of ‘Kids Card’. A variant of the e-ID for kids between 12 – 18 years. MIT India Reading Group 7/3/2018

National ID in Estonia Governed according to the Digital Signature Act (DSA). 98% of Estonians have national ID card Digital signature embedded in card Authentication and Digital Signing Issues that may help in UID design: Signature validity verification: Solved by Online Certificate Status Protocol (OCSP). Lack of widespread digital signature implementation: Solved by DigiDoc, a server-side and client-side software International interoperability: Addressed through OpenXAdes project for universal understanding of legally binding MIT India Reading Group 7/3/2018

MIT India Reading Group 7/3/2018

MIT India Reading Group 7/3/2018

MIT India Reading Group 7/3/2018

Challenges in biometric technology Iris recognition Retina Scan Privacy Invasions Social Implications Ethics MIT India Reading Group 7/3/2018

Recommendations Administrative Department Legal Department Public Awareness Process for handling immigrants , Dual citizenships Enrolling and tracking citizens by multitude of technologies Legal Department To make amendments to existing legal system for accommodating UID cards Restricting multiple issuance of cards, Access Restriction should be handled Technical Department Random number generation for UID card number Self check digits Effective Encryption and Decryption schemes and to architect system better for handling security issues MIT India Reading Group 7/3/2018

Conclusions Better access to a host of government services Eliminates fake and duplicate identities which assist government to stem exchequer losses arising out of ghost identification or duplication Clearer view of population and other demographic indicators. Provides major impetus to e-Governance programs and services Internal security scenario can be monitored well with UID’s being used to track criminals. MIT India Reading Group 7/3/2018

THANK YOU MIT India Reading Group 7/3/2018