The Sultanate of Oman National ID Program

Size: px
Start display at page:

Download "The Sultanate of Oman National ID Program"

Transcription

1 The Sultanate of Oman National ID Program CASE STUDY GlobalPlatform technology delivers the first smart card-based citizen ID program ever to be deployed in the Middle East Overview In October of 2002, local Omani authority, the Royal Oman Police (ROP), together with His Majesty the Sultan launched the first smart card-based citizen ID program ever to be deployed in the Middle East. Their aim was to enhance the country s identification processes while also improving its IT infrastructure, providing better, faster and more accurate public services for its citizens, together with higher levels of security. Previously, the Sultan of Oman had no citizen registry in place, making it very difficult to provide efficient services for it citizens and achieve adequate identification of its population. This situation was exacerbated by the fact that a large percentage of the population included noncitizens, merely residing in Oman. It was decided that there existed a need for a more robust identification system enabling the authorities to maintain accurate, clean population data and to be able to more easily keep it updated. The main objectives of the program were to: Modernize the National Registry System (NRS) Simplify and speed up administrative processes Provide better qualitative public services to Omani citizens and residents Engage and promote the usage of IT technology and e-government facilities Increase Homeland Security The creation of the NRS is an integral part of Oman s ID program and will act as the pillar of the country s future e-government initiatives. Oman s government decided to renew the NRS in line with a new legislation act (the Royal Decree 66/99, propagated in October 1999) in accordance with its strategy towards country modernization. The NRS is the central population database that allows the country to build a record with data collected from different databases where data is stored per category (for example, pictures, fingerprints, demographic information etc). Through the NRS, authorities will be able to register details for each Omani and foreign resident in a single centralized system. The objectives of the NRS were to: Set the foundation for a modern and secure infrastructure based on the new NRS and smart ID card system Prepare the migration of the country to efficient and secure on-line services contributing to decentralization and proximity to citizens Engage in a new census of the population being able to know who is an Omani citizen and who is a resident of Oman (Prior to revitalizing the NRS, Oman only had records for around 20% of the entire population). One challenge facing the implementation team involved linking the new system to an existing system that supports legacy applications for Drivers Licenses and Immigration including passport management and border crossing applications. A two-way synchronization of the data shared by these systems needed to be developed. In addition, data migration was required in order to populate the new databases that existed with the new system. Page 1 of 5

2 Development of the Solution Initially the scope of the National ID card will support three applications: The Identity application which holds personal credentials including biometric information (photo and two fingerprints) Driver s license application Border control application The new modern system utilizing Java CardÔ technology and a PKI application will rapidly extend this scope to secure exchange in e- government applications. Initially a limited number of government employees will use public-key cards for secure and government network access. Additional e- government applications that could eventually take advantage of PKI technology include strong authentication on e-government portals to access services for healthcare, driver s license and electronic voting. Gemplus was awarded the contract to deliver this first Middle Eastern smart card-based identity solution, providing project management and integration, as well as services, software and cards to the Sultanate of Oman. Gemplus goal, managing the project, is to streamline and increase the quality of public services through the automated citizen ID system. The GlobalPlatform technology employed by Gemplus includes GlobalPlatform s Card Specification v2.0.1 and Multiple Application Smart Card Management Systems Functional requirements v3.4. The GlobalPlatform Card Specification v2.0.1 is a standard that provides a common security and card management architecture that protects the most important aspect of a chip card system investment the infrastructure. The original RFP issued by the Royal Oman Police clearly requested that the card platform must be based on open Java Card technology, so Gemplus consequently proposed their latest Java Card platform compliant with Java Card 2.1 and GlobalPlatform Card Specification version Sagem was subcontracted by Gemplus to provide the fingerprint biometric technology for the ID cards. The ID cards, complete with biometric recognition, can be checked by both portable terminals and by automatic electronic validation, for example, at airport immigration checkpoints. Other companies involved in the overall solution to the Oman Government include Datacard Group, who provided the personalization equipment for the cards and GBM for the IT infrastructure. The Implementation / Solution Gemplus selected its secure ID solution, ResIDent for the Sultanate s smart ID card system as it encompasses all the products and services the Sultanate required. It is based on Java CardÔ, ISO and PKI standards, providing a secure, flexible and user-friendly tool for delivering services to and identifying citizens in both physical and digital environments. The versatile open platform provides capabilities for smart card-based border control, driver s license programs, healthcare and e-government applications. It delivers a complete and fully integrated smart ID card system designed for nationwide ID programs such as the Sultanate of Oman s ID program. While the program was launched in October 2002, initial roll-out of cards to Omani citizens did not begin until January of By the end of March, 2004, nine (9) regional offices had been deployed. Due to the fact that this is a face-to-face enrollment and issuance process, the system did not start using a mass roll-out. Enormous progress was made however, with the ROP deploying 100,000 ID cards in a seven Page 2 of 5

3 month period, by August 1 st, This has been a great achievement especially considering that during the first 6 months, not all regional offices had been opened and this initial period was used to improve efficiency of officers operating the system. They have set themselves a target to issue 250, ,000 ID cards per year. While there are approximately 2.7 million citizens in Oman, total deployment will be in the vicinity of 1.2 million cards as ID cards are issued to only those over the age of 15. Oman s citizens and residents will be able to store their personal credentials including their name, address, digital photo ID and fingerprints securely and conveniently on the cards. Gemplus has been able to regulate the complete ID card process cycle, from enrollment to delivery, to less than 30 minutes, enabling the ROP to issue as many cards as possible in an efficient time frame. With Gemplus initially managing the undertaking, the project is on track and handover to the local authorities has been done in terms of operation, through extensive IT training and skills transfer programs. As Gemplus is responsible for maintaining and supporting the system for five years, a small project team remains to work alongside the ROP, supporting their operation and adding new features where required. As a result, modifications and upgrades are due to be delivered by the end of 2004 to fulfill new requirements. Some interesting facts and figures regarding this project include: 1 centralized Citizen registration solution 1 SCMS for managing the card life cycle of the GlobalPlatform card PKI based solution 12 decentralized local personalization centers (personalized issuance solution) 24 ID card enrollment desks 23 smart card personalization machines 17 issuance desks (delivery of the ID card) 254 mobile biometric devices distributed by the police station 6 e-gates in 1 airport (for pilot) The Benefits Both the Omani Government and its citizens will benefit from the establishment of its secure nationwide ID program. Increased Homeland security was one of the main objectives and this will be achieved via the biometrics-based border control applications and securing authentication of citizens and residents traveling in and out of the country. At the same time, a reduction in identity fraud is accomplished due to a combination of biometrics and security features printed on the card body itself making it extremely difficult to forge, duplicate or counterfeit the ID card for fraudulent use of citizens identity and personal data. Durability and versatility of the ID documents is also a consequence of the program with the ID card comprising of a highly durable body, utilizing state-of-the-art security printed features such as Guilloches, OVI, secured holograms and others, enabling a very long card life cycle. Besides implementing a stronger means of identification to its population, the introduction of the smart ID card requires a revamping of the country s entire IT infrastructure in order to deploy and use the technology to its fullest. Additionally, through expanding the services offering to Oman s population with various Internet-based applications, the program also imposes that more people start using computers on a regular basis, enhancing the nation s overall IT skills. Results The Sultanate of Oman s goal of providing better, faster and more accurate public services Page 3 of 5

4 for its citizens together with higher levels of security, including biometrics is well underway. In the first seven months of the smart ID program being rolled out, 100,000 cards have been issued. 12 regional offices have been established around the country and 24 enrollment desks for ID card issuance and updates have been instituted. The regional offices manage the enrollment of citizens and/or expatriates, and are in charge of personalization and issuance of the ID card. Results will continue to be monitored and reported as the program continues and the citizens provide feedback. Lessons Learned / Moving Forward While the project is still progressing, both Gemplus management team and the ROP have learnt many lessons that are now being applied during the final stages of issuance and further into maintenance and supporting stages. ID projects are very complex and as such, expectations for execution times may need to be adjusted. In terms of time frames that Gemplus has experienced, 12 to 24 months is generally required for preparing RFI, RFP and suppliers to selection and award of contract. An additional 12 to 24 months can be expected for designing and setting up the system before the first card is even issued. For more heavily populated countries, involving many different departments and decision makers, this process can take longer. Gemplus also advises to pay close attention processes, policies and integration with legacy systems. In order to satisfy one of the ROP s initial objectives of engaging and promoting e- Government applications, Gemplus is developing PKI-based digital signing of e- government transactions. Healthcare services as well as electronic voting are two web-based applications planned for the public. Additionally, government employees will be able to utilize the card securely and efficiently for secure network access and exchange. Driver s licenses and work permits for expatriots will also be included in future applications using the smart ID card. Currently the only post-issuance operations involves the ability to update information on existing applications details such as address, marital status and other personal details. With the development of the some of the e- government applications, post issuance will be a continuing part of the process. The Sultanate of Oman has recognized that smart card technology provides the ideal means to manage personal credentials and to provide a secure, reliable and flexible platform for public services and security. Learning from the experiences of other nations, Oman has adopted a state-of-the-art open and flexible solution that is capable of standing the test of time. As more cards are being rolled out, opportunities for improvements and additions have been identified and are currently being worked upon. Mainly involving additional ID applications on the card, Gemplus is now working with the ROP to accomplish these. Page 4 of 5

5 Sources Gemplus website Press Center Carl Norell Gemplus Public Relations ( communication) Gemplus Project Manager (personal communication) Gemplus ResIDent Product information Royal Oman Police Website Page 5 of 5

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal

More information

Smart Tiger STARCHIP SMART TIGER PAYMENT PRODUCT LINE. Payment. STiger SDA. STiger DDA. STiger DUAL

Smart Tiger STARCHIP SMART TIGER PAYMENT PRODUCT LINE. Payment. STiger SDA. STiger DDA. STiger DUAL PAYMENT CATALOG Smart Tiger Payment STiger SDA Static or Java Card Modules offer for Contact SDA markets STARCHIP SMART TIGER PAYMENT PRODUCT LINE is a versatile compound of a Highly Secure Microcontroller,

More information

The Leading Provider of Identity Solutions and Services in the U.S.

The Leading Provider of Identity Solutions and Services in the U.S. THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Request of Expressions of Interest For Information Technology Consulting Firm

Request of Expressions of Interest For Information Technology Consulting Firm Election Commission Secretariat Preparation of Electoral Roll with Photographs and Facilitating the Issuance of National Identity Card Project Islamic Foundation Building Agargaon, Dhaka. No. PERP&FINIDC/Ops/040/480

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

THE LEADING EDGE OF BORDER SECURITY

THE LEADING EDGE OF BORDER SECURITY THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly

More information

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201. PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize

More information

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector Schlumberger PKI /Corporate Badge Deployment Neville Pattinson Director of Business Development & Technology IT & Public Sector 1 Overview Background Overview of the PKI and Corporate Badge components

More information

SECURE DIGITAL SIGNATURES FOR APPRAISERS

SECURE DIGITAL SIGNATURES FOR APPRAISERS ABSTRACT An appraiser s credibility is represented by a valid license and the signature affixed to a report. Providing a common requirement for the creation of digital signatures for licensed or certified

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

CRESCENDO SERIES Smart Cards. Smart Card Solutions

CRESCENDO SERIES Smart Cards. Smart Card Solutions CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to

More information

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries

More information

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed

More information

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities Morpho Driver s license Solution for governments and road traffic authorities Governments are looking for an

More information

More Power and Performance With Each Printed Card

More Power and Performance With Each Printed Card s tan d ar d ID SOlutions GUIDE More Power and Performance With Each Printed Card the importance of secure identity Today s society shares information at incredible speeds. A technologically advanced world

More information

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION SOME RECENT NATIONAL AND REGIONAL INITIATVES IN IDENTITY MANAGEMENT

More information

The National Number and the Automation of the Civil Records Project Ministry of Interior Administration of Civil Records

The National Number and the Automation of the Civil Records Project Ministry of Interior Administration of Civil Records The National Number and the Automation of the Civil Records Project Ministry of Interior Administration of Civil Records The National Number Project is considered one of the most endeavoring and pioneering

More information

Federal e-government Agenda: Authentication and Identity Management

Federal e-government Agenda: Authentication and Identity Management Federal e-government Agenda: Authentication and Identity Management David Temoshok Director, e-government Strategic Development GSA Office of Governmentwide Policy June 5, 2002 President s Management Agenda

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Legislative Council Panel on Security. The Next Generation Smart Identity Card System

Legislative Council Panel on Security. The Next Generation Smart Identity Card System For discussion on 6 January 2015 LC Paper No. CB(2)534/14-15(03) Legislative Council Panel on Security The Next Generation Smart Identity Card System PURPOSE This paper seeks Members support for the proposal

More information

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt Privacy by Design The case of Automated Border Control Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt Overview: (Automated) border control; Identity management in (Automated)

More information

Evidence of Identity: Breeder Documents and Beyond Barry J. Kefauver International national Standards ds Organization ation Why Care? A false passport in the hands of a terrorist is as dangerous as a bomb

More information

PIV Scheduler Tool. Screen Shots from May 1, 2013 9:00am Eastern

PIV Scheduler Tool. Screen Shots from May 1, 2013 9:00am Eastern PIV Scheduler Tool Screen Shots from May 1, 2013 9:00am Eastern PIV Scheduler Tool This slide deck was created to provide a heads up and quick overview of the PIV Scheduler Tool to the Education Staff

More information

Company Overview. Iraq: Activities & Experience

Company Overview. Iraq: Activities & Experience Company Overview Iraq: Activities & Experience SAFE ID Solutions AG 2009 SAFE ID Management Board Omar El Gohary Executive Vice President Operations Long year leadership and operational experience with

More information

Biometrics in Identity as a Service

Biometrics in Identity as a Service Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions

More information

Agency Services. Moving Ahead. Agency Services Road Map

Agency Services. Moving Ahead. Agency Services Road Map Table of Contents Moving Ahead... 2 Service Delivery... 3 Agency-specific Applications... 4 Shared Services... 6 Targets for Initiatives and Outcomes... 7 Outcomes... 8 Cross-walk between the Goals, Strategies

More information

Worldwide Smart Card Implementations using GlobalPlatform Standards

Worldwide Smart Card Implementations using GlobalPlatform Standards Worldwide Smart Card Implementations using GlobalPlatform Standards Kevin Gillick - Marketing Center Chair, Taipei Business Seminar 12 February 2004 Agenda GlobalPlatform Overview Industry and Geographical

More information

Biometrics for payments. The use of biometrics in banking

Biometrics for payments. The use of biometrics in banking Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,

More information

Category: Nomination for NASPE s Eugene H. Rooney, Jr. Award Innovative State Human Resource Management Program

Category: Nomination for NASPE s Eugene H. Rooney, Jr. Award Innovative State Human Resource Management Program PA Enterprise Learning Management System 2009 Rooney Award Nomination Cover Sheet: PA Enterprise Learning Management System Category: Nomination for NASPE s Eugene H. Rooney, Jr. Award Innovative State

More information

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s This document is scheduled to be published in the Federal Register on 05/11/2016 and available online at http://federalregister.gov/a/2016-11133, and on FDsys.gov 9110-9B DEPARTMENT OF HOMELAND SECURITY

More information

White paper. Implications of digital certificates on trusted e-business.

White paper. Implications of digital certificates on trusted e-business. White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

IDaaS: Managed Credentials for Local & State Emergency Responders

IDaaS: Managed Credentials for Local & State Emergency Responders IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com

More information

Optical Memory Cards in Federal Government

Optical Memory Cards in Federal Government NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation

More information

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart

More information

CONDIS. IT Service Management and CMDB

CONDIS. IT Service Management and CMDB CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...

More information

IBM Software Universal Health Identifiers: Issues and Requirements for Successful Patient Information Exchange

IBM Software Universal Health Identifiers: Issues and Requirements for Successful Patient Information Exchange IBM Software Universal Health Identifiers: Issues and Requirements for Successful Patient Information Exchange Lorraine Fernandes, RHIA Scott Schumacher, Ph.D. Universal Health Identifiers: Issues and

More information

Security of Identity Management. Professor Brian Collins

Security of Identity Management. Professor Brian Collins Security of Identity Management Professor Brian Collins Headline issues Purpose of ID management and ID security Practical process and technology issues Enrolment processes Identity verification Limitations

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

Provincial IDIM Program BC Services Card Project Identity Assurance Services Solution Architecture Overview

Provincial IDIM Program BC Services Card Project Identity Assurance Services Solution Architecture Overview Provincial IDIM Program BC Services Card Project Identity Assurance Services Version: 0.6 2014-03-14 Document Information Document title IAS Document file name IAS Solution Architecture Introduction.docx

More information

Application of Biometric Technology Solutions to Enhance Security

Application of Biometric Technology Solutions to Enhance Security Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact RA-ITCentral@pa.gov

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

ELECTRONIC SIGNATURES FACTSHEET

ELECTRONIC SIGNATURES FACTSHEET ELECTRONIC SIGNATURES FACTSHEET Electronic signatures mean that you can exchange information with others electronically and securely safe in the knowledge that everyone is who they claim to be and that

More information

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network

More information

Veridos Protects Identities. The expert for worldwide government solutions

Veridos Protects Identities. The expert for worldwide government solutions Veridos Protects Identities The expert for worldwide government solutions 2 Personal identity in a globalized world Today s globalized world is fast, mobile, and highly virtualized. We now expect access

More information

The Case Study of CRM

The Case Study of CRM Customer Relationship Management (CRM) Category: Cross-Boundary Collaboration and Partnerships Initiation date: December 2010 Completion date: August 2012 Nomination submitted by: Samuel A. Nixon Jr. Chief

More information

Department of the Treasury

Department of the Treasury Department of the Treasury Customer Service Plan 2011 Executive Summary As part of its mission managing the U.S. Government s finances and resources, the Department of the Treasury serves millions of customers.

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES

ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES ACI-NA PUBLIC SAFETY & SECURITY, FALL CONFERENCE 2012 BADGING BEST PRACTICES SURVEY Cheryl Vauk Productive Solutions

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

U.S. Department of State. Customer Service Plan

U.S. Department of State. Customer Service Plan U.S. Department of State Customer Service Plan October 24, 2011 Executive Summary The Department of State is responsible for carrying out the nation s foreign policy, protecting U.S. citizens, representing

More information

Centralized Application and Management System. Category: Data, Information and Knowledge Management. Initiation date: June 2011

Centralized Application and Management System. Category: Data, Information and Knowledge Management. Initiation date: June 2011 Centralized Application and Management System Category: Data, Information and Knowledge Management Initiation date: June 2011 Completion date: November 2012 Nomination submitted by: Samuel A. Nixon Jr.

More information

Online Licensure Application System (OLAS): Nursing Licenses Faster and Easier

Online Licensure Application System (OLAS): Nursing Licenses Faster and Easier Online Licensure Application System (OLAS): Nursing Licenses Faster and Easier Category: Digital Government: Government to Citizen (G to C) Herb Thompson Deputy Division Administrator Division of Enterprise

More information

Dell Mobile Clinical Computing

Dell Mobile Clinical Computing Dell Mobile Clinical Computing Healthcare Technology Solutions that Deliver Greater Security, IT Productivity and Clinician Efficiency Today s healthcare environment relies heavily on the latest technology

More information

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM Four Pillars that HSPD-12 Programs must consider for a secure, efficient, interoperable PIV enterprise deployment. Continued HSPD-12 Implementation under OMB

More information

CASE 8: Procurement of public key infrastructure

CASE 8: Procurement of public key infrastructure CASE 8: Procurement of public key infrastructure Uni. Athens / CERES Country / region Netherlands Short description This is the case of an integrated central e-government infrastructure for issuing and

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network

MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network Michigan State Police Criminal Justice Information Center (517) 336-6574 June 2006 Software Systems and Services Available The sharing of information in a highly secure environment has become increasingly

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

European Electronic Identity Practices

European Electronic Identity Practices European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

A Look at Maryland s Early Childhood Data System

A Look at Maryland s Early Childhood Data System A Look at Maryland s Early Childhood Data System 2 State policymakers and administrators use the Maryland Model for School Readiness (MMSR) the main component of the state s early childhood data system

More information

إجراءات التسجيل تعبئة االستمارة. Emirates Identity Authority خصائص البطاقة. Card Features توصيل البطاقة شكل البطاقة. Mobile Registration

إجراءات التسجيل تعبئة االستمارة. Emirates Identity Authority خصائص البطاقة. Card Features توصيل البطاقة شكل البطاقة. Mobile Registration إجراءات التسجيل شكل البطاقة Registration s تعبئة االستمارة خصائص البطاقة Card Features توصيل البطاقة التسجيل املتنقل Registration Fees Validity? Card Delivery Mobile Registration Registration Process We

More information

The identity card program in Belgium

The identity card program in Belgium The identity card program in Belgium The keystone of e-government FINANCIAL SERVICES & RETAIL ENTERPRISE Government > CASE STUDY TELECOMMUNICATIONS TRANSPORT The identity card program in Belgium The keystone

More information

An Operational Architecture for Federated Identity Management

An Operational Architecture for Federated Identity Management An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity

More information

Examples of Large Scale Biometrics Systems:

Examples of Large Scale Biometrics Systems: Examples of Large Scale Biometrics Systems: International Solutions for Exit/Entry, Border Control, National ID and Secure Passport Systems Biometrics Consortium Conference Pat Sankar, Behnam Bavarian

More information

INTRODUCTION AND HISTORY

INTRODUCTION AND HISTORY INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development

More information

e Governance ULB Level Reform

e Governance ULB Level Reform ULB Level Reform 1. The Reform e-governance is a form of public administration making use of information and communication technologies (ICT) to enhance the access and delivery of government services to

More information

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document

More information

ConCERTO Secure Solutions for Converged Systems

ConCERTO Secure Solutions for Converged Systems ConCERTO Secure Solutions for Converged Systems Distribution for Switzerland: insinova ag www.insinova.ch Jens Albrecht Email: jens.albrecht@insinova.ch Phone: +41 41 748 72 05 September 2011 SCM Microsystems

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

DEPARTMENTAL REGULATION

DEPARTMENTAL REGULATION U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information

More information

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon

Border control using biometrics in Japan. September 2008 NEC Corporation/Daon Border control using biometrics in Japan September 2008 NEC Corporation/Daon Today s Agenda 1. Project Overview 2. Challenges and Lessons Learned 1. Project Overview Japan Biometrics Identification System

More information

We make cards and payments work for people as a part of everyday life. We bring information to life

We make cards and payments work for people as a part of everyday life. We bring information to life We make cards and payments work for people as a part of everyday life We bring information to life 2 EVRY is a leading IT company in the Nordic region. Through advice, technology and solutions, EVRY brings

More information

Coesys Border Management

Coesys Border Management Coesys Border Management Offering convenience for secure border crossing Improving border intelligence for detection and prevention Supporting your immigration organization Combating cross-border crime,

More information

PKI Deployment Business Issues

PKI Deployment Business Issues An OASIS PKI White Paper PKI Deployment Business Issues By Amir Jafri and June Leung (FundSERV Inc.) For the Oasis PKI Member Section OASIS PKI White Paper OASIS (Organization for the Advancement of Structured

More information

End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid

End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid ID WORLD Abu Dhabi 18-19 March 2012 Secure ID in the Digital World Dan Butnaru Product Manager Keynectis End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid Organized

More information

A Tradition of Excellence

A Tradition of Excellence Inkript Security Printing & Identification Solutions 01 Inkript A Tradition of Excellence Inkript delivers bespoke solutions in the fields of security printing, smartcards and trusted identification. Established

More information

SmartPay 2. Highway Contract Route Contractor Guide Voyager Fleet

SmartPay 2. Highway Contract Route Contractor Guide Voyager Fleet SmartPay 2 Highway Contract Route Contractor Guide Voyager Fleet Table of Contents Introduction...3 U.S. Bank Voyager Contact Information...3 Highway Contract Route Contractor Responsibilities...4 HCR

More information

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006 HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure

More information

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS Mary Olson, Senior Marketing Manager, Citizen Solutions INTRODUCTION Government organizations are regularly challenged

More information

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE

More information