…Providing Assured Identity By Barr. Chris ‘E Onyemenam Director General / CEO, NIMC 18 th November, 18 th November, 2015 National e-ID Card for Credible.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information.
Customer First : Strategic Context and Opportunities Rory Mair.
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
ONE STOP INVESTMENT CENTRE (OSIC)
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Secure Communication Architectures.
Department of Labor HSPD-12
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
Country Update: Austria Herbert Leitold Secure Information Technology Center - Austria
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Creating Unique IDs for 1.2 Billion Residents of India Unique ID Authority of India Identity Management – A National Perspective.
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
Sub-session 1B: General Overview of CRVS systems.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
THE ROLE OF CIVIL REGISTRY TO ACTIVATE THE ELECTRONIC AUTHENTICATION
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
National Infrastructure Tina Yule Technical Assurance Co-ordinator 21 st Century Government Unit.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
Technology as enabler for electronic benefit transfer – Case of Micro ATM, BC, Aadhaar Authentication System November 29,
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics Authentication Technology
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
THE MALAYSIAN ELECTRONIC PASSPORT
AADHAR TECHNOLOGY Gurneet Kaur, Nitin Mangal. What is Aadhar?  Unique Identification Number linked to a person’s demographic and biometric information.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Financial Inclusion. 2 Indian Demographics Population demographics APL (71%) BPL(29 %) Mobile subscriber penetration has reached 80% of population 970mn.
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
The Aadhaar project Unique Identity and Its Positive Externalities for Inclusiveness 16 th January 2013 UIDAI
Module 1 Version:1.3_ Release date:
(c) 2010, Government of Pakistan November 14, 2010 Ali Arshad Hakeem Chairman NADRA Government of Pakistan NADRA Headquarters, Islamabad Ali Arshad Hakeem.
The NIMS and the Financial Sector In Nigeria By Barr. Chris ‘E Onyemenam Presentation at the 2 ND International Conference on Due Diligence Organized by.
THE MALAYSIAN ELECTRONIC PASSPORT
Namibia: Civil Registration and Vital Statistics System
Smart Data infrastructure
Internet Governance in Nigeria:
Unique Identification Number Project
Civil Registration Process: Place, Time, Cost, Late Registration
A strategy for improving CRVS in Lao PDR
Bonne Santé 16.
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Protecting your data and core systems Discussion panel
Legal Framework for Civil Registration, Vital Statistics
HIMSS National Conference New Orleans Convention Center
Regional Initiatives – South Asia Civil Registration Group (CR8)
Protecting your data and core systems Discussion panel
Outline… A. Introduction, definitions and background
Managed Content Services
HLN Consulting, LLC® November 8, 2006
E-identities (and e-signatures)
Introduction to key terms and concepts of legal identity
The State of Data: Evaluating BIG DATA & its Impact
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Global Smart Card Market to hit $65 Bn by 2025: Global Market Insights.
Presentation transcript:

…Providing Assured Identity By Barr. Chris ‘E Onyemenam Director General / CEO, NIMC 18 th November, 18 th November, 2015 National e-ID Card for Credible Electoral Process

National Identity Management Commission Content 2 Card Issuance or Identity Management 7 National e-ID Card Features 24 Conclusion 3 Benefits Background

National Identity Management Commission 3 Background 1

National Identity Management Commission 4 Citizenship Birth - NPopC Education - NECO,JAMB,WAEC Entrepreneurship - SMEDAN Useful Services Health - NHIS Social Life - Ikoyi Club, NBA, ICAN, ANAN NIM Employment - NDE Finance (BVN) - CBN Death - NPopC GSM number /SIM Reg. The Challenge: Absence of Unique Identity for Individuals …There has been no single source of unique identity for citizens throughout their lifetime from birth to death… So many independent databases… Why the Chaos? FRSC PVC BVN SIM Register

National Identity Management Commission Unique Identification System for Nigeria Lack of unique identity (NIN) from birth to death Absence of a central ID authentication and verification services Disparate yet duplication of identity databases in MDAs …Need for Harmonization Disparate yet duplication of identity databases in MDAs …Need for Harmonization Previous schemes focused on card issuance High financial exclusion Previous identity schemes had poor coverage Establishment of the National Identity Management Commission; NIMC’s mandate is to establish, manage and operate the National Identity Management System (NIMS), with five components; Vision is to provide a single version of truth or unique identity for every citizen (identity assurance); Foster the orderly development of an identity sector in Nigeria; THE PROBLEM: NO FOUNDATION IDENTITY THE RESPONSE High prevalence of counterfeit identification

National Identity Management Commission The NIMC Mandate in Perspective 6 Establish, operate and manage the National Identity Management System (NIMS) The establishment of National Identity Management Commission (NIMC) Effective take over by the Commission of the assets and liabilities of the former Department for National Civil Registration Key NIMC Mandate according to establishment Act No. 23 of 2007:

National Identity Management Commission 7 Card Issuance Vs Identity Management 2

National Identity Management Commission 8 NIMS : Unique Identity…Card Issuance only one component The core of Identity Management is one identity per individual- WHO YOU ARE Identity Registration/ Enrolment Database Development & Maintenance What it is Components of the NIMS All components of the NIMS are based on best practice in identity management to ensure Proof of Identity Smart Card Issuance NIN Generation Authentication & Verification Harmonization of Databases

National Identity Management Commission Concept of a unique identification scheme linkages 7 Source: Adapted from World Bank Analysis – Digital Identity Tool Kit Safety Nets Healthcare Finance (BVN) Transport Immigration Civil Registration Identity Enrolment National Identity Registry Digital Identity landscape consists of a ‘foundational registry’ and ‘linked’ functional registries Driver’s License INEC (Voters Register) Pension Insurance Tax (TIN) Others ‘Breeder document’ to establish identity is key. Who You Are- ’Foundation identity’ Eligibility/Benefits Status (‘functional Identity)

National Identity Management Commission 10 Establishing A Single Version of Truth Before NIMS With NIMS Passport Pension Police Health Care Banking Voters Card Phone (SIM) Driver‘s License Passport Pension Health Care Voters Card Int. Passport Police (security) Banking (Finance/co mmerce) Phone (SIM) Driver‘s License - Ghost Identities - Multiple Identities - Duplicate Identities

National Identity Management Commission 11 National e-ID Card Features 3

National Identity Management Commission eID Nigeria: card overview The National Identity Card: Your identity database and payment card in your pocket. identitypayment travel

National Identity Management Commission 13 Components of the NIMS – The National Identity Card Phase 1 (First Five) Applets Identity Information (eID) Payment (EMV) Travel (ICAO) Verification (MoC) Security (PKI) eIDePKIMoCICAO Driving License Transport Health Payment Voting RO M EEPR OM Pension Insurance Custom Tax SIM KeysCertificates Personal data Fingerprints Additional data FIREWALL Extended Access Control Version 2 X.509 Certificates Authentication Digital Signature CV Certificates Document Authenticity Inspection Systems (POS)

National Identity Management Commission 14 Concept of an electronic Identity Management System The NIMS aligns with the World Bank’s Vision of a National Identity System Source: World Bank Analysis – Digital Identity Tool Kit Harmonisation of Agencies with NIN World Bank Concept NIMS Model

National Identity Management Commission 15 NIN A national identity serves as a foundation for a country’s development. NIN A national identity serves as a foundation for a country’s development. 1 1 PILLARS OF HARMONIZATION Technology policy, standards, and systems are important for a well- functioning identity system. PILLARS OF HARMONIZATION Technology policy, standards, and systems are important for a well- functioning identity system. 2 2 NIMC A National Identity Agency’s mandate should revolve around the collection, storage and use of citizen information NIMC A National Identity Agency’s mandate should revolve around the collection, storage and use of citizen information 3 3 HARMONIZATION PAYOFF Linking a functional registry with the national registry ensures that each eligible beneficiary is unique. HARMONIZATION PAYOFF Linking a functional registry with the national registry ensures that each eligible beneficiary is unique. 4 4 UNIQUE IDENTITY Biometric technologies help establish uniqueness: in the absence of reliable birth certificates, etc. UNIQUE IDENTITY Biometric technologies help establish uniqueness: in the absence of reliable birth certificates, etc. 5 5 KEY BENEFIT A government faces a higher up-front cost of setting up a national identity system, with revenues realizable later. KEY BENEFIT A government faces a higher up-front cost of setting up a national identity system, with revenues realizable later. 6 6 Digital identity is a cross-sector platform for economic and social development: It allows a government to issue public services to target beneficiaries more efficiently, and a firm can deliver products and services to consumers more effectively. Building a Unique Identification System Digital Identity Scalable Universal Identification Infrastructure

National Identity Management Commission 16 Foundational Vs Functional A country first develops a general- purpose identity platform, which is designed to support all the identity Use Cases expected down the line. It focuses on the enrollment under the framework of “enroll once and be identified for life.” The expectation is that, once identity becomes a supplied commodity, an entire ecosystem of applications, not even imagined initially, will emerge A country begins with a system that addresses the needs of a very specific application of identity (e.g., identification of vulnerable populations or healthcare recipients). Over time, such a system can evolve and merge with other functional programs, then migrate towards a universal identity regime in phased steps. Foundational to FunctionalFunctional to Foundational Nigeria’s NIMS is a Foundational to Functional Identity System – A top-down approach Other countries that have adopted this approach include India, South Africa, Malaysia, etc. This approach avoids multiple registration and redundancy and provides economies of scale Top-down approachBottom-up regime Source: World Bank Analysis

National Identity Management Commission Unique Identity: Global Best Practice on Identity Management The World Bank vision of an Identity lifecycle: The registration, issuance and use stages Post-issuance services NIN Slip Issuance Card Issuance NIN Slip Issuance Card Issuance Physical Verification ABIS de- duplication Physical Verification ABIS de- duplication Online verification MoC verification Online verification MoC verification NIMC Pre- enrolment NIMC enrolment NIMC Pre- enrolment NIMC enrolment Capture Issue Credential Authenticate Update Certify Identity Lifecycle World Bank Lifecycle NIMC Lifecycle KEY 7 Who you are NIN Eligible  Voters card  TIN  BVN  Drivers license  Passport  etc Vs

National Identity Management Commission Trained Personnel Registration Centers : Mobile Enrolment Centres Data Centers (Primary and Disaster) Core Network Sites : Access Network Sites : Satellite Terminals : Servers and Computers Generation of NIN (De-duplication Sub-System) Building a Unique National Identity Database

National Identity Management Commission 19 NIMS : Unique Identity The core of Identity Management is one identity per individual- WHO YOU ARE Identity Registration/ Enrolment Database Development & Maintenance What it is Components of the NIMS All components of the NIMS are based on best practice in identity management to ensure Proof of Identity Smart Card Issuance NIN Generation Authentication & Verification Harmonization of Databases

National Identity Management Commission Biometric Modalities The e-ID project has adopted 3 modalities Facial recognition With ICAO compliant capture Fingerprint match-on-card Capturing 10 Fingerprints, de- duplicated, stored in standard template for adults (i.e. age = 16 and above) Iris recognition Development/imp lementation ongoing

National Identity Management Commission Authentication and Verification as Part of the Electoral Process Authentication Service Agents (ASAs) Enterprise web-based online service Online verification using NIN Online identification using biometrics Authentication & Verification Access & security services for external traffic into NIMS backend Network & Security Systems Provide trust services for entire NIMS system Public Key Infrastructure Deployed at customer premises to interface persons to be verified ASA Terminals/ Service Systems AVCH linked Aggregator system interface with special parameters Service Aggregator Systems Overview of Authentication & Verification Clearing House System Components 16 Card Acceptance Devices (CADs) Off-line verification based on Match-on-Card

National Identity Management Commission Voter Register By Electoral authority Voter register Linked to Civil Register Voter Register Linked to Other Govt. schemes Building Voter Register 3 Major Approaches THE GOAL: Eligible citizen identification devoid of ambiguity

National Identity Management Commission Towards leveraging on NIMS Voter Registration Accreditation of Eligible Voters Voting & Vote count e-Voting Authentication & Verification Enrolment into NIDB Electoral Process Leveraging on NIMS NIN

National Identity Management Commission 24 Benefits 4

National Identity Management Commission 25 Benefit of NIMS to Electoral Process Convenient & Simplified Process of Enrollment Protection from Identity Theft Easy & Convenient way of proving Identity Help facilitate reform processes Elimination of multiple & ghost identities

National Identity Management Commission 26 Benefit of NIMS to Electoral Process: A Comparative Benefits of National Identity Management System Easy & Convenient way of proving Identity Protection from Identity theft Elimination from multiple & ghost identities Restore public confidence Simplified enrolment process Help facilitate reform process Characteristics of a Successful Voting System Scalability Convenience Reliability Deployment of Authentication & Verification Interface Accuracy Flexibility Consistency Democratic Privacy

National Identity Management Commission 27 Conclusion 5

National Identity Management Commission 28 Short Term Targets of Harmonization What harmonization will achieve CBN/NIBSSAbout 16million records INECUp to 60 million records NCCAbout 75 million records FRSCAbout 5 million records Nigeria Immigration Service 20 million records NHISData Capture aligned The process of harmonizing with the MDA’s will save the Government N36.0bn

National Identity Management Commission 29 Presidential Thoughts….. “It will be more cost effective if you work together. It helps even the credibility of the election process, as Nigerians of voting age can be identified easily,”

National Identity Management Commission 30 THANK YOU The Management & Staff of NIMC remain grateful to you