A User-centric, Anonymous and Interoperable pan-European eID Pavel Sekanina September 13th, 2006.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

The Committee of the Regions A political assembly of the European Union, representing local and regional government.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Stork is an EU co-funded project INFSO-ICT-PSP Secure Identity Across Borders Linked Secure Electronic Identity Across Europe! STORK – 4 TH I NDUSTRY.
Information System Assurance Practices in China Key players doing IS Assurance In China Regulatory Regime and Professional Organizations -Regulatory AuthoritiesRegulatory.
Banking sector in Montenegro. Free template from 2 Macroeconomic data GDP (mil €)1, , , , ,
Utilization of Basic Register Information from the PSI Perspective Aki Siponen, Counsellor, Ministry of Finance Business with Public Information National.
Audit Committee in Albania Legal framework Law 9226 /2006 “On banks in Republic of Albania” Law 9901/2008 “On entrepreneurs and commercial companies” Corporate.
Anonymous, Liberal and User-Centric Electronic Identity Supports Citizen Privacy Protection in e-Government OASIS eGov Workshop - 1 May 2008 Libor Neumann.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Network Identity Kai Kang 27 th October Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Using Digital Credentials On The World-Wide Web M. Winslett.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Introduction To Windows NT ® Server And Internet Information Server.
Identity Management, what does it solve By Gautham Mudra.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION STORK Presentation Lithuania March 2010.
E-government in Russia For effective interaction of citizens and govermnemt Dmitrij Gurtov, Director of the Department for regional development of project.
LOGO MIRJANA SEKULOVSKA, PhD, DEPUTY MINISTER OF INFORMATION SOCIETY Republic of Macedonia Ministry of Information Society.
© 2005 CRIF The right people for you © 2005 CRIF CRIF for banking and financial institutions CRIF is one of the main international groups specialized.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Use case: Federated Identity for Education (Feide) Identity collaboration and federation in Norwegian education Internet2 International Workshop, Chicago,
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Österreich 2006 Austria 2006 Autriche 2006 Präsidentschaft der Europäischen Union Presidency of the European Union Présidence de L’Union européenne ★★★★★★
JJ Mois Année Competitive Intelligence as a key decision factor in Komercni banka André Léger Executive Director, Marketing.
About Chris Welch Synergy – Global Reach. Local Service. - Cell Online - USA | South.
CS CS 5150 Software Engineering Lecture 18 Security.
Slide 1 Smart Cards for eGovernment and Health Insurance - Status in Austria.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Designing an E-Government Solution Jon Colombo In collaboration with Client or Partner logo.
Ideas for Today and Tomorrow Riho Oks
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Mellon Year 1 Review Michael J. Halm Alex Valentine.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
The Italian Statistical System 88 th DGINS The future of the European Statistical System Palermo, Italy Palazzo dei Normanni 19 th -20 th September 2002.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Moderator: Göran Axelsson, Swedish Agency for Public Management Inputs for a pan- European strategy.
Ian Bailey Director Application Architecture Office of CIO, Province of BC A User Centric and Claims Based Architecture for British Columbia.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Promoting excellence in social security Building on sector wide commonalities to enhance the benefits of Information.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Anonymous, Liberal, User-Centric Electronic Identity – New Systematic Design of e-ID Infrastructure Libor Neumann ANECT a.s.
Back office integration for better E-government services Crossroads Bank for Social Security Frank Robben General manager Crossroads Bank for Social Security.
Identity Management and Enterprise Single Sign-On (ESSO)
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
E-Government in Germany: The Example of Process Chains Federal Chancellery Better Regulation Unit
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Identity and Access Management
Financing Czech projects in South Korea
Sofortüberweisung: An Introduction
Data and Applications Security Developments and Directions
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Patrick Staes and Ann Stoffels
Introduction of ISO/IEC Identity Proofing
E-identities (and e-signatures)
Presentation transcript:

A User-centric, Anonymous and Interoperable pan-European eID Pavel Sekanina September 13th, 2006

Company introduction  Description  Portfolio  Business Data  Selected Customers 2

3 ANECT – who are we?  We are a major supplier of information and communication systems and applications relating to convergent networks, their services and security.  As a systems integrator, we are active, in particular, in the public administration, commercial and financial institutions and telecommunication operators.  We provide professional services from consultation and audits to the design of solutions and project management, the development of applications, the monitoring and maintenance of networks and ICT solutions outsourcing.

4 Our portfolio

5 …some business data  floatation of the company (20 employees)  ANECT has 200 employees in Prague, Brno (Czechland) and Bratislava (Slovakia).  CEO – Miroslav Řihák, voted Entrepreneur of the Year 2005 in the Czech Republic

6 Selected customers  Public administration  Ministry of Finance, Ministry of Labor and Social affairs, Ministry of Agriculture, Ministry of Foreign Affairs  General Directorate of Customs, ÚZSVM, ČSSZ, …  Commercial sector  ČP (Czech Insurance), ČP Leasing, Komerční banka, Kooperativa Insurance  DHL, ČEZ, IKEA, KIA Motors Slovakia  Aliatel, Czech Telecom, Eurotel, Vodafone, …

Project  A User-centric, Anonymous and Interoperable pan-European eID  Current state  Desired final state  Basic schema of the solution  Suggested milestones 7

Authentication, Authorization, Accounting 8  Authentication – a process where is established that Pierce Brosnan is really The Pierce Brendan Brosnan  Role - a group of users with the same type of rights  Pierce Brosnan – role James Bond  James Bond group: Thomas Sean Connery, Pierce Brendan Brosnan, George Lazenby, Roger Moore, Timothy Dalton  Authorization – rights to perform certain action, usually based on the role of the person  James Bond – „licence/license to kill“  editor – has right to cut out “unnecessary” scenes from the movie  Accounting – keeping track of the actions (logs)

9 Current status  Service provider centric solutions  user has to obey and adjust to the rules set up by service provider  Government issued eID  Austria  Belgium  Estonia  Liberty alliance – identity provider  consortium of private companies  federated architecture  circles of trust  EU activities: Modinis-IDM project  Results  Inflation of identities and passwords  Limited use on the international level  Potential Security risk caused by user misbehavior

10 Targeted result  User centric solution  Technologically neutral  An architecture based on open standards  “Anonymous ID” – protecting privacy of user data  Standardized measure of the „strength“ of eID  e.g. username + password = “weak” - good for on-line chat  2048bit SSL + Secure token = “strong” – good for e- Banking  eID is used in the real life:  from web chats, e-Shops, e-Libraries, e-Banking to e-government communication on the international level

11 Key principles of the solution  Independent authentication and authorization  To allow mixture of authentication techniques  Multiple IDs  Access rights managed and stored separately from place where access rights are executed  EAD – External Authorization Database  Management of the identity base on and stored in the information systems and not in the tokens

12 Basic schema

13 Suggested milestones  Interface design  reuse of current standards  adding of new necessary rules and missing parts  Security policy  Architecture of relations between the participants  Citizens,  Government agencies,  Service providers,  …  Pilot  consortium  design verification

14 Questions (and maybe some answers ) ? ? ? !