NetSeT Global Solutions

Size: px
Start display at page:

Download "NetSeT Global Solutions"

Transcription

1 11030 Belgrade, Osogovska 10 Republic of Serbia Tel./fax: NetSeT Global Solutions COMPANY PROFILE Belgrade, 2015

2 Contents: 1. NetSeT Global Solutions Company Profile References Selected publications... 9 NetSeT Global Solutions - Company Profile 2015.doc 2

3 1. NetSeT Global Solutions Company Profile NetSeT was established in The main activity has been Implementation, system integration and strategic consulting in the area of secure e- Government systems and cryptographic solutions for mission critical information systems. Technical staff of NetSeT consists of 25 + experienced specialists from the fields of Cryptology, IT Security, Smart Cards, Identity management, Biometrics, PKI and Telecommunications,. They represent the largest IT security and cryptographic group of specialists in the region. NetSeT Global Solutions is a leading regional solution and service provider in the area of specialized, large scale Smart Card eid/epassport systems, secure e-government Registers, high-grade PKI, Biometrics, Mobile Security and Computer Network Security. It is a company specialized in Development, System Integration and Project Management of a high/grade National-level Secure IDentity infrastructure. Last five years, NetSeT Global Solutions has been listed amongst Top 50 e-passport technology suppliers by ID WORLD magazine. The main areas of activities: Government Secure National e-government registers, PKI infrastructure, National eid and epassport Issuing and Verification, Border Control Cyber Security and Data protection Secure e-health Information Systems Financial institution - Secure electronic payments, Secure Corporate Information Infrastructure Key technologies: Secure 3-tier architectures for mission critical systems Model Driven J2EE complex IT systems High-grade PKI systems, Qualified digital signature technology, Symmetrical and Asymmetrical Cryptography, design and implementation Digital certificate validation and Identity privilege management, Smart card applications and security middleware - proprietary COS and JavaCard, Smart Identification Technologies for eid and epassport NetSeT Global Solutions - Company Profile 2015.doc 3

4 Secure biometric ID data acquisition and matching Complex Life Cycle Identity Management based on secure eidentity Personalization management and multifunctional biometric eid and e-passport issuing and management system Mobile Security systems End-to-End Encryption devices Bulk Encryption devices for Secure Telecommunication infrastructure Integrated logical and physical access control, Service range: Consulting in the area of System design of a Secure Electronic Identity Infrastructure PKI design and deployment Identity Management systems concept and deployment National e-government Registers design and implementation Development and system integration of specialized Identification Document management and Personalization systems eid/epass Issuing System and PKI project management and implementation IT Security solutions design, implementation and integration Mobile Security design and implementation Security architecture design for authenticity, integrity, confidentiality and nonrepudiation Cryptographic protocols design, implementation and training Research and Development Results: Technical specialists from NetSeT and consultants have published more than 150 scientific papers in domestic and international conferences and journals. ISO Certification: NetSeT Global Solution has been ISO certified for its Information Security Management System, implementing the highest international security standards in the secure software development process for mission critical information systems. In addition, from 2013 NetSet Global Solution has been ISO 9001 certified company for its Quality Management System. NetSeT Global Solutions - Company Profile 2015.doc 4

5 2. References Secure Messaging System and PKI Infrastructure, Ministry of Foreign Affairs of the Republic of Serbia, Q4/2015 New generation of the MoD eid card, applet, middleware and personalization system, Ministry of Defense of the Republic of Serbia, Q2/2015 E-Passport Readers and Support Services for the Serbian Border Police, Ministry of Interior of the Republic of Serbia, Q1/2015 Certification Authority and Mobile Security Solutions, Government of the Republic of Serbia, Q4/2014 Design and Implementation of the New National Citizen eid V1.5 (second generation) Issuing System, Ministry of Interior of the Republic of Serbia, Q3/2014 Hardware Security Token for the MoI IT Security Infrastructure, Ministry of Interior of the Republic of Serbia, Q3/2014 New Serbian Citizen eid Applet and Middleware V1.5, The Institute for Manufacturing Banknotes and Coins of the National Bank of Serbia, Q2/2014 Enrolment, Central and Local eid Issuing System, Secure Civil Biometric Registration System, Country in Middle East (undisclosed), Q1/2014 Public Servant eid Applet and Middleware, Weapon Certificate applet and Middleware, The Institute for Manufacturing Banknotes and Coins of the National Bank of Serbia, Q1/2014 National Register of Fines and e-service Infrastructure for Citizens, IDDEA National ID Agency Bosnia and Herzegovina, Q4/2013 E-Passport Readers and Fingerprint Scanners for the New Enrolment Network of the Serbian Ministry of Interior, contract with Ministry of Trade and Telecommunications of the Republic of Serbia, European IPA Project, Q4/2013 Upgrade of the MoI Certification Authority and supporting applications for Issuing e-passports and ID Documents, Ministry of Interior of the Republic of Serbia, Q4/2013 New National eservice Infrastructure for the Serbian Citizens based on Electronic ID Documents, Ministry of Trade and Telecommunications of the Republic of Serbia, European IPA Project, Q4/2013 Mobile epassport Reader with Samsung Galaxy NFC Interface for 3 rd generation of ICAO epassports, NXP Semiconductors, Germany, Q3/2013 Electronic Vehicle Registration (evr) Applet and Middleware for the Ministry of Interior of the Republic of Serbia, The Institute for Manufacturing Banknotes and Coins of the National Bank of Serbia, Q2/2013 Secure middleware for an Official eid Card with contact interface, Customer in Germany (undisclosed), Q2/2013 NetSeT Global Solutions - Company Profile 2015.doc 5

6 Mobile eid/epassport Reader with PACE functionality (German version), Customer in Germany (undisclosed), Q1/2013 Central Card Management Infrastructure for Issuing Citizen eid, Customer in Scandinavia, (undisclosed), Q2/2013 Mobile Security Solutions on Android platform, Customer in Germany (undisclosed), Q4/2012 German e-health Card Connector software, Customer in Germany (undisclosed), Q3/2012 Security solution for mobile police units based on a Secure Micro SD card, Ministry of Interior of the Republic of Serbia, Q3/2012 New PKI Infrastructure, Key Management and Official Employee eid Issuing System, Ministry of Interior of the Republic of Serbia, Q2/2012 Secure Citizen eid Card Middleware Suite with PACE German model, Customer in Germany (undisclosed), Q1/2012 Serbian National Electronic Health Insurance Card Issuing Infrastructure, Serbian National Health Insurance Fund, Q4/2011 German e-health Card field supporting applications project, prime contractor Customer in Germany (undisclosed), Q3/2011 Secure PKI Middleware Suite for the Citizen eid project, Country in the Middle East (undisclosed), Prime contractor Muehlbauer AG, Q2/2011 Serbian National Electronic Health Insurance Card Middleware and supporting Applications, NXP Semiconductors/AdvanIDe GmbH, Walluf Germany, Q1/2011 Card Management System and Data Preparation for the new e-vehicle License and Driving License Issuing System, Contract with National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, prime contractor Muehlbauer AG, Germany, Q4/2010 Serbian National Electronic Health Insurance Card ehi Applet and PKI Applet, NXP Semiconductors/ AdvanIDe GmbH, Walluf Germany, Q2/2010 Public Key Infrastructure, Smart Card Applets and Personalization System for the Ministry of Defense eid and ehealth Card, Military Social Insurance Fund of the Ministry of Defense, Republic of Serbia, Q1/2010 EAC epassport Smart Inspection and Verification System of the Serbian Ministry of Interior and Ministry of Foreign Affaires, - Contract with National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, prime contractor Muehlbauer AG, Germany, Q4/2009 National ICAO EAC epassport Issuing System, ICAO EAC PKI, epassport National Register and Central epassport Management System Ministry of Foreign Affaires of the Republic of Tajikistan, prime contractor Muehlbauer AG, Germany, Q4/2009 National ICAO epassport Issuing System Extension: PKI, Data Preparation and Document Signer for the Extended Access Control (EAC) epassports of the NetSeT Global Solutions - Company Profile 2015.doc 6

7 Republic of Serbia according to the European EAC directive - National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, prime contractor Muehlbauer AG, Germany, Q3/2009 Public Key Infrastructure and PKI Smart Card Implementation for Official Electronic Identification, IDDEA National ID Agency Project sponsored by Delegation of the European Commission to Bosnia and Herzegovina, Q2/2009 Central Secure ID Document Management System (SDMS) for the New National ID Documents of the Republic of Congo, - Prime contractor Muehlbauer AG Germany, Q2/2009 Central Secure ID Document Management System (SDMS) for the New National Driving licenses, Vehicle Registration licenses and Car plates for the Government of Iraq, - prime contractor Muehlbauer AG Germany, Q1/2009 egovernment Certification Authority and Secure PKI middleware for Qualified Electronic Signature with National eid Ministry of Telecommunication and Information Society, Republic of Serbia, Q1/2009 PKI enabled Secure Document Management and Distribution System in the Serbian Diplomatic and Consular Offices Ministry of Foreign Affaires of the Republic of Serbia, Q4/2008 Secure Biometric ID Document Management System (IDMS) for State Ministry Inteligensa, Venezuela, prime contractor Muehlbauer AG Germany, Q3/2008 National ICAO PKI Infrastructure, LDS Data Preparation and Network Security Sybsystem for the new epassport of the Republic of Serbia - National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, Republic of Serbia, Q2/2008 Co-branded PKI Payment Card Issuing System - Diners International Serbia and Serbian Chamber of Commerce, Q2/2008 Government Secure Electronic ID Issuing System: system delivery and consulting services - State Agency, Country in South African region (undisclosed), Q1/2008 Secure Biometric ID Document Management System (IDMS) and National epassport Register, Country in North African region (undisclosed), Q4/2007 Smart Chip Coding Solutions for Government ID and Welfare JavaCard solutions, Komsco - National Mint Company, Seoul, South Korea, 2007 Secure Data management and reporting, Mobicom - VIP Mobile operator Macedonia, 2007 Secure Data management and reporting, Mobicom - VIP Mobile operator Serbia, 2007 Smart Card Management and Personalization solution for Banking Smart card - Algerian Post Bank, HB Technology, Algeria, 2007 Pilot Biometric Smart Card Issuing System for Government of Andalusia Ravenpack Ltd, Malaga, Spain, 2006 NetSeT Global Solutions - Company Profile 2015.doc 7

8 National Identity Register and ID Document Management System for Macedonian ICAO e-passports, National ID and DL Ministry of Interior, Republic of Macedonia, prime contractor G&D, Germany, 2006 National PKI infrastructure and ID Management System for Macedonian ICAO e- Passport Issuing system, Ministry of Interior, Republic of Macedonia, prime contractor G&D, Germany, 2006 National Root Certification Authority Serbian Ministry of Science, 2006 PKI system for Secure e-business Serbian Chamber of Commerce, 2006 ID Data Preparation and Management, Key Management system for the Citizen eid and epassport project - Ministry of Internal Affairs of the Republic of Serbia, prime contractor G&D, Germany, 2005 Smart card Applications, Data Preparation and Security System for the National Biometrical ID documents (ID, Employee eid, DL, VL, WCL, MRTD) of the Serbian Ministry of Internal Affairs, prime contractor G&D, Germany, 2004 Secure application system for Serbian smart card ID Issuing Network - Ministry of Internal Affairs of the Republic of Serbia, 2004 PKI system and Software Security Solutions Ministry of Internal Affairs of the Republic of Serbia, 2004 NetSeT Global Solutions - Company Profile 2015.doc 8

9 3. Selected publications R.Popovic at all: eid Key Enabler for Secure egovernment, ID WORLD, Sixth EMEA Summit on strategic topic of Identification, Abu Dhabi, UAE, 2013 D.Milicev: Model-Driven Development with Executable UML, WILEY Publishing Inc, ISBN , USA, 2009 Z.Savic: Identity Solution Practical Lessons Learned from Serbian Chamber of Commerce Implementation, ID WORLD 2008, WORLD, Milan, Italy, 2008 D.Milicev, A.Markovic, Z.Savic et all: Model-Driven Development of Large-Scale eid Document Issuance and Management, e-smart 2007 World e-id Conference, Sophia Antipolis, French Riviera, 2007 Z.Savic: Secure eid Management Architectures, EEMA/ENISA The European e- Identity Conference, Paris, France, 2007 Z.Savic: eidis + - Electronic Document Issuing System Architecture, EEMA European e-id Card Conference, Brussels, Belgium, 2006 Z.Savic: End-to-End Trusted eid Issuing and Verification, Canadian Security Mission in Europe, Z.Savic: Secure Issuing System for Smart Card based eid and ICAO epassports, Thales e-security Conference, Berlin 2006 M.Markovic, Z.Savic, B.Kovacevic: Secure Mobile Health Systems: Principles and Solutions, M-Health Emerging Mobile Health Systems pp , ISBN: , Springer Publisher 2006 Z.Savić, M.Marković, Development of Secure Web Financial Services in Serbia, Proceedings of Information Security Solution Europe Conference, ISSE 2003, Vienna, October 7-9, M.Marković, G.Đorđević, T.Unkašević, On Optimizing RSA Algorithm Implementation on Signal Processor Regarding Asymmetric Private Key Length, in Proc. of WISP 2003, Sept., 3-6, 2003, Budapest, Hungary. G.Đorđević, T.Unkašević, M.Marković, Optimization of Modular Reduction Procedure in RSA Algorithm Implementation on Assembler of TMS320C54x Signal Processors, DSP 2002, July, 2002, Santorini, Greece. M.Marković, T.Unkašević, G.Đorđević, RSA Algorithm Optimization on Assembler of TI TMS320C54x Signal Processors, EUSIPCO 2002, Toulouse, France, Sept. 3-6, M.Marković, G.Đorđević, T.Unkašević, Influence of Key Length in Possible Optimization of RSA Algorithm Implementation on Signal Processor, in Proc. of ICEST 2002, Oct., 1-4, 2002 NetSeT Global Solutions - Company Profile 2015.doc 9

10 Z.Savić, A.Nikolić, M.Marković, Cryptographic Proxy Gateways in Securing TCP/IP Computer Networks, Information Security Solution Europe Conference, ISSE 2001, London, September 26-28, M.Marković, Z.Savić, Ž.Obrenović, A.Nikolić, A PC Cryptographic Coprocessor based on TI Signal Processor and Smart Card System, Communications and Multimedia Security Issues of the New Century, R.Steinmetz, J.Dittman, M. Steinebach, Eds., Kluwer Academic Publishers, 2001 IFIP TC6/TC11, Fifth Joint Working Conference on Communications and Multimedia Security, 2001, Germany NetSeT Global Solutions NetSeT Global Solutions - Company Profile 2015.doc 10

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Position Paper European Citizen Card: One Pillar of Interoperable eid Success

Position Paper European Citizen Card: One Pillar of Interoperable eid Success Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

Electronic machine-readable travel documents (emrtds) The importance of digital certificates Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.

More information

Best Solutions for Biometrics and eid

Best Solutions for Biometrics and eid Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document

More information

Public Key Directory: What is the PKD and How to Make Best Use of It

Public Key Directory: What is the PKD and How to Make Best Use of It Public Key Directory: What is the PKD and How to Make Best Use of It Christiane DerMarkar ICAO Programme Officer Public Key Directory ICAO TRIP: Building Trust in Travel Document Security 19/10/2015 Footer

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

Oberthur Technologies. A Technology Leader

Oberthur Technologies. A Technology Leader Oberthur Technologies A Technology Leader Olivier Prestel, Managing Director Identity Business Unit Oberthur Technologies Identity BU 16 April 2014 1 Agenda Oberthur Technologies: a technology leader A

More information

Statewatch Briefing ID Cards in the EU: Current state of play

Statewatch Briefing ID Cards in the EU: Current state of play Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled

More information

Security Model in E-government with Biometric based on PKI

Security Model in E-government with Biometric based on PKI Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute

More information

Company Overview. Iraq: Activities & Experience

Company Overview. Iraq: Activities & Experience Company Overview Iraq: Activities & Experience SAFE ID Solutions AG 2009 SAFE ID Management Board Omar El Gohary Executive Vice President Operations Long year leadership and operational experience with

More information

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions. Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,

More information

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the

More information

Introduction ICAO PKD

Introduction ICAO PKD Introduction ICAO PKD Higher Travel Security Dr. Hermann Sterzinger Veridos COO October 2015 Border control with epassports Certificates exchanged: CSCA Certificates Document Signer Certificates Certificate

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper. EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple

More information

Landscape of eid in Europe in 2013

Landscape of eid in Europe in 2013 Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid

End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid ID WORLD Abu Dhabi 18-19 March 2012 Secure ID in the Digital World Dan Butnaru Product Manager Keynectis End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid Organized

More information

World Summit on Information Society (WSIS) Forum 2013. 16 May 2013

World Summit on Information Society (WSIS) Forum 2013. 16 May 2013 World Summit on Information Society (WSIS) Forum 2013 Toolkit for creating ICT-based services using mobile communications for e- government services 16 May 2013 Hani Eskandar ICT Applications coordinator

More information

Sicherheitsaspekte des neuen deutschen Personalausweises

Sicherheitsaspekte des neuen deutschen Personalausweises Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking

More information

Transaction Security. Advisory Services

Transaction Security. Advisory Services Transaction Security Advisory Services Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance

More information

Egyptian Best Practices Securing E-Services

Egyptian Best Practices Securing E-Services Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats

More information

How To Get Smart Cards From Atos

How To Get Smart Cards From Atos secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through

More information

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,

More information

An introduction to EJBCA and SignServer

An introduction to EJBCA and SignServer An introduction to EJBCA and SignServer PrimeKey Solutions AB Tomas Gustavsson http://www.primekey.se tomas@primekey.se EJBCA and SignServer Euro PKI projects and use cases 1 EJBCA - Open Source Enterprise

More information

Implementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins

Implementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins Implementation of e-signature in the ESCWA Region: Status and Next Steps By Matthew Perkins Understanding e-signature How do we identify ourselves online? Electronic records of real-world authenticators

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

European Electronic Identity Practices

European Electronic Identity Practices European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach

More information

Moving to the third generation of electronic passports

Moving to the third generation of electronic passports Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader

More information

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.

More information

CryptoNET: Security Management Protocols

CryptoNET: Security Management Protocols CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,

More information

Secure Cloud Identity Wallet

Secure Cloud Identity Wallet 1 CREDENTIAL Secure Cloud Identity Wallet DS-02-2014 Dr. Arne Tauber u 2 CREDENTIAL Research Project Call: H2020-DS-2014-1 Acronym: CREDENTIAL Type of Action: IA Number: 653454 Partners: 12 Duration: 36

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

Proposed Framework for an Interoperable Electronic Identity Management System

Proposed Framework for an Interoperable Electronic Identity Management System page 1 Proposed Framework for an Interoperable Electronic Identity Management System Amir Hayat 1, Thomas Rössler 1 Several Member States in the European Union (EU)have rolled out electronic identity (eid)

More information

ISO/IEC 24727 for secure mobile web applications

ISO/IEC 24727 for secure mobile web applications ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?

NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II? NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with

More information

N E T C @ R D S. Smart Card and Network Solutions for the Electronification of the European Health Insurance Card

N E T C @ R D S. Smart Card and Network Solutions for the Electronification of the European Health Insurance Card N E T C @ R D S Smart Card and Network Solutions for the Electronification of the European Health Insurance Card ehealth 2005 - Munich, April 21 st 2005 Dr. R. Tavakolian and Dr. G. Brenner Central Research

More information

International Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE

International Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE PRESS RELEASE 21 June 2005 International Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE Around 80 representatives from 18 European countries,

More information

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy

Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information

More information

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006 HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure

More information

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES

COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document

More information

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions

More information

Federal e-government Agenda: Authentication and Identity Management

Federal e-government Agenda: Authentication and Identity Management Federal e-government Agenda: Authentication and Identity Management David Temoshok Director, e-government Strategic Development GSA Office of Governmentwide Policy June 5, 2002 President s Management Agenda

More information

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents 3 Your Personal Identity: Unique, Secure, Multifaceted Every person has individual characteristics by which

More information

We Must Comply with International Requirements! Introducing Biometric ID Cards in France

We Must Comply with International Requirements! Introducing Biometric ID Cards in France We Must Comply with International Requirements! Introducing Biometric ID Cards in France Meryem Marzouki CNRS - LIP6/PolyTIC / IRIS Meryem.Marzouki@iris.sgdg.org www.iris.sgdg.org Terrorizing Privacy?

More information

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent

More information

Description of the Technical Component:

Description of the Technical Component: Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance

More information

Electronic Citizen Identities and Strong Authentication

Electronic Citizen Identities and Strong Authentication Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta sanna.suoranta@aalto.fi Content

More information

THE LEADING EDGE OF BORDER SECURITY

THE LEADING EDGE OF BORDER SECURITY THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly

More information

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004

More information

Veridos Protects Identities. The expert for worldwide government solutions

Veridos Protects Identities. The expert for worldwide government solutions Veridos Protects Identities The expert for worldwide government solutions 2 Personal identity in a globalized world Today s globalized world is fast, mobile, and highly virtualized. We now expect access

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Discover Germany s Electronic Passport

Discover Germany s Electronic Passport Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize

More information

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority Dr. Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, United Arab Emirates Abstract Digital

More information

Strong Authentication for Future Web Applications

Strong Authentication for Future Web Applications Strong Authentication for Future Web Applications Chris Williams Leidos, Inc. July 18, 2014 For W3C Identity in the Browser Workshop Abstract Leidos (formerly SAIC), has been using strong authentication

More information

Tentative Action Plan

Tentative Action Plan Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information

More information

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue

Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities Morpho Driver s license Solution for governments and road traffic authorities Governments are looking for an

More information

Operational and Technical security of Electronic Passports

Operational and Technical security of Electronic Passports European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, Legal

More information

FAQs Electronic residence permit

FAQs Electronic residence permit FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit

More information

Advanced Card Systems Ltd.

Advanced Card Systems Ltd. Issue Date: 17 Jan 2007 Publication: Frost & Sullivan (http://www.frost.com/prod/servlet/market-insight-top.pag?docid=92710322) By Jafizwaty Ishahak, Program Manager, Smart Cards and Auto ID, APAC Mr.

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum

More information

FAQs - New German ID Card. General

FAQs - New German ID Card. General FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new

More information

goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services

goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services Data Protection and Security Considerations in an egovernment Cloud in Germany Dr. Klaus-Peter Eckert Public Sector Cloud Forum

More information

An Open Source eid Simulator Open Identity Summit 9th -11th September 2013

An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community

More information

ON IDENTITY CARDS. Based on Article 65 (1) of the Constitution of the Republic of Kosovo, LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS

ON IDENTITY CARDS. Based on Article 65 (1) of the Constitution of the Republic of Kosovo, LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS LAW Nо. 05/L-015 ON IDENTITY CARDS The Assembly of the Republic of Kosovo, Based on Article 65 (1) of the Constitution of the Republic of Kosovo, Approves LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS

More information

IPA National Programme 2008 Part II Bosnia and Herzegovina Fiche 16: Citizen Identification Protection System

IPA National Programme 2008 Part II Bosnia and Herzegovina Fiche 16: Citizen Identification Protection System IPA National Programme 2008 Part II Bosnia and Herzegovina Fiche 16: Citizen Identification Protection System 1. Basic information 1.1 CRIS Number: 2008/20-339 1.2 Title: Consolidation of Citizen Identification

More information

IDENTITY & SECURITY MAKING LIFE SAFER AND EASIER

IDENTITY & SECURITY MAKING LIFE SAFER AND EASIER IDENTITY & SECURITY MAKING LIFE SAFER AND EASIER IN A NUTSHELL SAFRAN IDENTITY & SECURITY Safran Identity & Security is a global leader in identity and security solutions for an increasingly digital and

More information

TELECOMMUNICATION NETWORKS

TELECOMMUNICATION NETWORKS THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS

More information

What is the Right Security Solution for Mobile Computing? #RSAC

What is the Right Security Solution for Mobile Computing? #RSAC SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F

More information

CASQUE SNR Presentation 16 th April 2015

CASQUE SNR Presentation 16 th April 2015 Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change

More information

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015

Breeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015 Breeder documents closing the gap in the identity management chain Christian Wagner VP SDM Government Washington, March 23, 2015 INTERNET OF THINGS IS RISING Five-Year (2014-2019) CAGR 57% 2014, Business

More information

Office Rents map EUROPE, MIDDLE EAST AND AFRICA. Accelerating success.

Office Rents map EUROPE, MIDDLE EAST AND AFRICA. Accelerating success. Office Rents map EUROPE, MIDDLE EAST AND AFRICA Accelerating success. FINLAND EMEA Office Rents H2 212 NORWAY Oslo 38.3 5.4% 7.% 295, SWEDEN Stockholm 44.7 4.5% 3.% 5, Tallinn 13.4 44,2 21. 5.25% 1.% 12,

More information

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos

More information

Optical Memory Cards in Federal Government

Optical Memory Cards in Federal Government NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation

More information

ICT budget and staffing trends in Healthcare

ICT budget and staffing trends in Healthcare ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y

More information

Secure egovernment Where convenience meets security. www.infineon.com/ccs

Secure egovernment Where convenience meets security. www.infineon.com/ccs Secure egovernment Where convenience meets security www.infineon.com/ccs Gaining transparency Electronic ID documents replace and enhance conventional ID documents that governments have been issuing for

More information

Towards Federated e-identity Management across GCC A Solution s framework

Towards Federated e-identity Management across GCC A Solution s framework Towards Federated e-identity Management across GCC A Solution s framework Ali M. Al-Khouri* and Malik Bechlaghem ** * Emirates Identity Authority, Abu Dhabi, UAE. (ali.alkhouri@emiratesid.ae) ** Logica

More information