EID: the Belgian Electronic Identity Card Jan Deprest Vlaanderen – OND-MVG – 28-06-2005.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Security and Interoperability Danny De Cock January 16th, 2012 Moldova Slides: godot.be/slidesgodot.be/slides.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Some initiatives of the Belgian government in order to stimulate E-government Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Designing and Implementing Secure ID Management Systems: BELGIUM’s Experience Washington - September 27 th, 2010 Frank LEYMAN © fedict All rights.
SESSION D: What You Know - What You Have - What You Are: The Role of Hardware Technologies to Provide Identity Assurance BELGIUM’s Experience Washington.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Copyright © FedICT All rights reserved Belgian Electronic Identity Card (BELPIC) Ir. Olivier LIBON. Microsoft EAP – Government & Education 7 April.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Belgian proposal of an organization model for an electronic identity card Frank Robben General Manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Identity and Access Mgmt and electronic Identities Belgian Federal Government Walter Van Assche January 16 th, 2012 Chisinau.
Secure Electronic Transaction (SET)
IT in the Swedish public sector Britta Johansson
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Citizen Centric Public Service Delivery: the Belgian approach International Symposium on “connected Governance” SSPA – Roma – 21-22/11/2009 Frank LEYMAN.
© Fedict All rights reserved Fedict and e-government in Belgium Bert Beyl - Sam Van den Eynde Euro India summit - 14/10/2011.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Copyright © FEDICT All rights reserved eID : The Belgian Electronic Identity Card Bart SIJNAVE Microsoft eID Awareness Program Brussels, 24 juni.
Module 9: Fundamentals of Securing Network Communication.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Zetes : Be eID applications & readers Belgian eID : applications & card readers Microsoft Event June Bart Symons
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
The social, economical and political impact of the eID Jan DEPREST – L-SEC – 19-may-2005.
Digital Signatures and Digital Certificates Monil Adhikari.
Staatssecretaris voor Informatisering van de Staat E-government in Belgium The Hague, September 2004 Christine Mahieu Strategic cell of the State Secretary.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Bulding blocks of e- government Ingmar Pappel. Bulding blocks of e-government  Personal Code  Digital Identity  Digital signature  X-Road  Organizations.
Citizen Centric Public Service Delivery: the Belgian approach TAIEX Multi-country seminar on eGovernment - April 27 th, 2010 Session: Putting public services.
Electronic Banking & Security Electronic Banking & Security.
NEW TECHNOLOGIES FOR CITIZENS AND TAX SYSTEM ELECTRONIC TAX RETURN FILING SYSTEM July, 2000 GRUPPO TELECOM ITALIA - FINSIEL.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Smart Data infrastructure
Key management issues in PGP
Belgian Federal Public Service for ICT Strategic cell
Lecture 4 - Cryptography
e-Security Solutions Penki Kontinentai Vladas Lapinskas
PKI (Public Key Infrastructure)
E-identities (and e-signatures)
National Trust Platform
Presentation transcript:

eID: the Belgian Electronic Identity Card Jan Deprest Vlaanderen – OND-MVG –

e-government

What is e-Government ? NOT : about government HOWEVER : it is about the government’s customers citizens businesses civil servants

e-Government principles > total solution > transparent (hide the internal organisation) > “I will say it only once” - Unique Data Source (Virtual Government) > limit the administrative formalities > no extra cost > Privacy > no digital divide

Architecture & building blocks SECURITY & PRIVACY FEDMAN UME OTHER AUTHORITIES OTHER INSTITUTIONS FPS Connected government Connected government PORTAL PORTAL AUTHENTIC SOURCES USER MGT

eID - basics A new ID-card with the format of a bank card and a powerful chip

Purpose eID project Proof of identity Signature tool > To give Belgian citizens an electronic identity card enabling them to authenticate themselves towards diverse applications and to put digital signatures

Which information ? > From a visual point of view the same information will be visible as on the current identity card : the name the first two Christian names the first letter of the third Christian name the nationality the birth place and date the sex the place of delivery of the card the begin and end data of the validity of the card the denomination and number of the card the photo of the holder the signature of the holder the identification number of the National Register > Identical functionality to current identity card Visual identification of the holder

Which information ? > From an electronic point of view the chip will contain the same information as printed on the card, filled up with : the identity and signature keys the identity and signature certificates the accredited certification service furnisher information necessary for authentication of the card and securization of the electronic data the main residence of the holder > (Currently) no encryption certificates > No biometric data (yet) > No electronic purse > No storage of other data Electronic identification of the holder

Distribution eID : how and where ? Municipality Face to face identification DeThe municipalities (1) (2) (12) National Register (3) VRK CM/CP/CI (4) CA ECA Bull (7) (8) (5) (9) (6) Meikäläinen Matti PIN & PUK1-code (10b) (10a) (11) (13)

eID - chip eID, welcome to the e-world !

Contents of the chip ID ADDRESS authentication digital signature RRN SIGN RRN SIGN RRN SIGN RRN SIGN PKIIDENTITY

eID : the main e-functionalities authentication data capture digital signature

Data capture > faster data capture data can be read directly from the card and stored in a particular system > more accurate data capture no more manual re-entrying  less error-prone process > more efficient data capture faster processing of information

eID : the main e-functionalities authentication data capture digital signature

Authentication log on to web sites (SSO ) container park library access control … swimming pool

eID : the main e-functionalities authentication data capture digital signature

Signature 1. Receive message 3. Check CRL/OCSP 5. Fetch public key 7. Compute reference hash 2. Inspect certificate 4. Check certificate 6. Fetch signature 8. Hash, signature, public key match? Matching triplet? CRL Alice hash Bob 3, Compose message3. Generate signature5. Collect certificate 2. Compute hash4. Collect signature6. Send message Alice hash Alice

eID - PKI Public Key Infrastructure

Trust Hierarchy Card Admin Cert Admin Client Auth Elec Sign Data Crypt Client Cert Admin CA Hierar Admin CRL Citizen CA CRL Gov CA CRL SelfSign Belgium Root ARL RootSign Belgium Root Server Cert Object Cert AdminAuth/Sign

Certificates > Citizen’s certificates & keys Authentication Certificate & key pair (1024 bits) provide strong authentication (access control) web site authentication single sign-on (login) etc. Signature Certificate & key pair (1024 bits) provide non repudiation (electronic signature equivalent to handwritten signature) Document Signing Form Signing etc. (Encryption Certificate & key pair) foreseen at a later stage private key backup/archiving AuthSign Citizen CA Belgium Root CA Crypt Citizen CA

Trust Services Request Auth/SignValidate Register Population Registry Secure Sites Municipality XKMS OCSP CA Factory Citizens CPSSLA

eID - toolkit Let’s make use of the power of the eID !

eID-toolkits > Two toolkits are under development : GUI + PKCS#11 libraries : reading, printing, validating and visualising the contents of the eID chip authentication proxy : easy authentication on multiple platforms > Purpose is to hide internal card changes > Labeling should be straightforward if applications use toolkits > Both toolkits are free of charge > Distribution through federal portal (  Projecten  eID) RELEASED

eID-toolkits

eID-toolkits : Identity

eID-toolkits : library

eID-toolkits : Certificates

eID-toolkits : Card & PIN

eID-toolkits : Options

eID - labelling

eID compliance label > Requirements: For citizens: get confidence in practices of service providers regarding eID usage (e.g. privacy) For service providers: demonstrate best practices are indeed applied regarding eID usage (e.g. fraud) > Inspired from two industry standards : eCommerce sites : eTransaction systems  Lot’s of auditors available For service providers: easy to extend a WebTrust/SysTrust accreditation to be eID compliant For auditors: easy to extend a WebTrust/SysTrust license to become an eID compliance agent  Fast & Rather cheap compared to other schemes  Not mandatory (but no eID liability otherwise) Trust Services

> Labeling procedure card readers applications creating trust for citizens, a legal basis for the government and branding for enterprises Based on industry standards : > Currently being worked out in cooperation with Banksys, CBSS eID-label

eID - applications Only the developers’ creativity will limit the usage of the eID card.

Home & Work > Office tools login (local PC & network) logon (other services) data & program confidentiality forms...

Administration > Federal TAX-ON-WEB VAT DIV … > Municipalities marriage house kids school library swimming pool container parks …

Telecom > Telephony reloadable & account cards GSM cards ==> UMTS/i-mode > Television Pay-TV decryption cards > Post registered Mail over internet  Internet VOIP (voice over IP) i-mode

Finance > Identification netbanking (userID/Tokens) loket (bank agency) insurance contract (signature) > Payment credit cards debit cards electronic purse

Healthcare > Insurance MediCard (contract) > Hospital private data (hospital card, etc) health/emergency data (blood group, etc)  Reembursement SIS card pharmacy doctors

Transport > Public transport ticketing in-flight entertainment > Parking access tolling > Gas & Fuel fuel cards loyalty cards

Retail & Delivery > Loyality Programs points collection online gift selection > Payment Credit contract signature payment system (domiciliation) > Home Delivery online orders data capture & digital signature

The sky is the limit ! home banking, online opening of accounts, … proof of membership SSO, … healthcare driver’s licence student cards, e-learning, … … e-commerce

Q&A

Rue Marie Thérèse 1/3 Maria-Theresiastraat 1/3 Bruxelles 1000 Brussel TEL FAX you !