NetSeT Global Solutions
|
|
- Roger Melton
- 7 years ago
- Views:
Transcription
1 11030 Belgrade, Osogovska 10 Republic of Serbia Tel./fax: NetSeT Global Solutions COMPANY PROFILE Belgrade, 2015
2 Contents: 1. NetSeT Global Solutions Company Profile References Selected publications... 9 NetSeT Global Solutions - Company Profile 2015.doc 2
3 1. NetSeT Global Solutions Company Profile NetSeT was established in The main activity has been Implementation, system integration and strategic consulting in the area of secure e- Government systems and cryptographic solutions for mission critical information systems. Technical staff of NetSeT consists of 25 + experienced specialists from the fields of Cryptology, IT Security, Smart Cards, Identity management, Biometrics, PKI and Telecommunications,. They represent the largest IT security and cryptographic group of specialists in the region. NetSeT Global Solutions is a leading regional solution and service provider in the area of specialized, large scale Smart Card eid/epassport systems, secure e-government Registers, high-grade PKI, Biometrics, Mobile Security and Computer Network Security. It is a company specialized in Development, System Integration and Project Management of a high/grade National-level Secure IDentity infrastructure. Last five years, NetSeT Global Solutions has been listed amongst Top 50 e-passport technology suppliers by ID WORLD magazine. The main areas of activities: Government Secure National e-government registers, PKI infrastructure, National eid and epassport Issuing and Verification, Border Control Cyber Security and Data protection Secure e-health Information Systems Financial institution - Secure electronic payments, Secure Corporate Information Infrastructure Key technologies: Secure 3-tier architectures for mission critical systems Model Driven J2EE complex IT systems High-grade PKI systems, Qualified digital signature technology, Symmetrical and Asymmetrical Cryptography, design and implementation Digital certificate validation and Identity privilege management, Smart card applications and security middleware - proprietary COS and JavaCard, Smart Identification Technologies for eid and epassport NetSeT Global Solutions - Company Profile 2015.doc 3
4 Secure biometric ID data acquisition and matching Complex Life Cycle Identity Management based on secure eidentity Personalization management and multifunctional biometric eid and e-passport issuing and management system Mobile Security systems End-to-End Encryption devices Bulk Encryption devices for Secure Telecommunication infrastructure Integrated logical and physical access control, Service range: Consulting in the area of System design of a Secure Electronic Identity Infrastructure PKI design and deployment Identity Management systems concept and deployment National e-government Registers design and implementation Development and system integration of specialized Identification Document management and Personalization systems eid/epass Issuing System and PKI project management and implementation IT Security solutions design, implementation and integration Mobile Security design and implementation Security architecture design for authenticity, integrity, confidentiality and nonrepudiation Cryptographic protocols design, implementation and training Research and Development Results: Technical specialists from NetSeT and consultants have published more than 150 scientific papers in domestic and international conferences and journals. ISO Certification: NetSeT Global Solution has been ISO certified for its Information Security Management System, implementing the highest international security standards in the secure software development process for mission critical information systems. In addition, from 2013 NetSet Global Solution has been ISO 9001 certified company for its Quality Management System. NetSeT Global Solutions - Company Profile 2015.doc 4
5 2. References Secure Messaging System and PKI Infrastructure, Ministry of Foreign Affairs of the Republic of Serbia, Q4/2015 New generation of the MoD eid card, applet, middleware and personalization system, Ministry of Defense of the Republic of Serbia, Q2/2015 E-Passport Readers and Support Services for the Serbian Border Police, Ministry of Interior of the Republic of Serbia, Q1/2015 Certification Authority and Mobile Security Solutions, Government of the Republic of Serbia, Q4/2014 Design and Implementation of the New National Citizen eid V1.5 (second generation) Issuing System, Ministry of Interior of the Republic of Serbia, Q3/2014 Hardware Security Token for the MoI IT Security Infrastructure, Ministry of Interior of the Republic of Serbia, Q3/2014 New Serbian Citizen eid Applet and Middleware V1.5, The Institute for Manufacturing Banknotes and Coins of the National Bank of Serbia, Q2/2014 Enrolment, Central and Local eid Issuing System, Secure Civil Biometric Registration System, Country in Middle East (undisclosed), Q1/2014 Public Servant eid Applet and Middleware, Weapon Certificate applet and Middleware, The Institute for Manufacturing Banknotes and Coins of the National Bank of Serbia, Q1/2014 National Register of Fines and e-service Infrastructure for Citizens, IDDEA National ID Agency Bosnia and Herzegovina, Q4/2013 E-Passport Readers and Fingerprint Scanners for the New Enrolment Network of the Serbian Ministry of Interior, contract with Ministry of Trade and Telecommunications of the Republic of Serbia, European IPA Project, Q4/2013 Upgrade of the MoI Certification Authority and supporting applications for Issuing e-passports and ID Documents, Ministry of Interior of the Republic of Serbia, Q4/2013 New National eservice Infrastructure for the Serbian Citizens based on Electronic ID Documents, Ministry of Trade and Telecommunications of the Republic of Serbia, European IPA Project, Q4/2013 Mobile epassport Reader with Samsung Galaxy NFC Interface for 3 rd generation of ICAO epassports, NXP Semiconductors, Germany, Q3/2013 Electronic Vehicle Registration (evr) Applet and Middleware for the Ministry of Interior of the Republic of Serbia, The Institute for Manufacturing Banknotes and Coins of the National Bank of Serbia, Q2/2013 Secure middleware for an Official eid Card with contact interface, Customer in Germany (undisclosed), Q2/2013 NetSeT Global Solutions - Company Profile 2015.doc 5
6 Mobile eid/epassport Reader with PACE functionality (German version), Customer in Germany (undisclosed), Q1/2013 Central Card Management Infrastructure for Issuing Citizen eid, Customer in Scandinavia, (undisclosed), Q2/2013 Mobile Security Solutions on Android platform, Customer in Germany (undisclosed), Q4/2012 German e-health Card Connector software, Customer in Germany (undisclosed), Q3/2012 Security solution for mobile police units based on a Secure Micro SD card, Ministry of Interior of the Republic of Serbia, Q3/2012 New PKI Infrastructure, Key Management and Official Employee eid Issuing System, Ministry of Interior of the Republic of Serbia, Q2/2012 Secure Citizen eid Card Middleware Suite with PACE German model, Customer in Germany (undisclosed), Q1/2012 Serbian National Electronic Health Insurance Card Issuing Infrastructure, Serbian National Health Insurance Fund, Q4/2011 German e-health Card field supporting applications project, prime contractor Customer in Germany (undisclosed), Q3/2011 Secure PKI Middleware Suite for the Citizen eid project, Country in the Middle East (undisclosed), Prime contractor Muehlbauer AG, Q2/2011 Serbian National Electronic Health Insurance Card Middleware and supporting Applications, NXP Semiconductors/AdvanIDe GmbH, Walluf Germany, Q1/2011 Card Management System and Data Preparation for the new e-vehicle License and Driving License Issuing System, Contract with National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, prime contractor Muehlbauer AG, Germany, Q4/2010 Serbian National Electronic Health Insurance Card ehi Applet and PKI Applet, NXP Semiconductors/ AdvanIDe GmbH, Walluf Germany, Q2/2010 Public Key Infrastructure, Smart Card Applets and Personalization System for the Ministry of Defense eid and ehealth Card, Military Social Insurance Fund of the Ministry of Defense, Republic of Serbia, Q1/2010 EAC epassport Smart Inspection and Verification System of the Serbian Ministry of Interior and Ministry of Foreign Affaires, - Contract with National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, prime contractor Muehlbauer AG, Germany, Q4/2009 National ICAO EAC epassport Issuing System, ICAO EAC PKI, epassport National Register and Central epassport Management System Ministry of Foreign Affaires of the Republic of Tajikistan, prime contractor Muehlbauer AG, Germany, Q4/2009 National ICAO epassport Issuing System Extension: PKI, Data Preparation and Document Signer for the Extended Access Control (EAC) epassports of the NetSeT Global Solutions - Company Profile 2015.doc 6
7 Republic of Serbia according to the European EAC directive - National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, prime contractor Muehlbauer AG, Germany, Q3/2009 Public Key Infrastructure and PKI Smart Card Implementation for Official Electronic Identification, IDDEA National ID Agency Project sponsored by Delegation of the European Commission to Bosnia and Herzegovina, Q2/2009 Central Secure ID Document Management System (SDMS) for the New National ID Documents of the Republic of Congo, - Prime contractor Muehlbauer AG Germany, Q2/2009 Central Secure ID Document Management System (SDMS) for the New National Driving licenses, Vehicle Registration licenses and Car plates for the Government of Iraq, - prime contractor Muehlbauer AG Germany, Q1/2009 egovernment Certification Authority and Secure PKI middleware for Qualified Electronic Signature with National eid Ministry of Telecommunication and Information Society, Republic of Serbia, Q1/2009 PKI enabled Secure Document Management and Distribution System in the Serbian Diplomatic and Consular Offices Ministry of Foreign Affaires of the Republic of Serbia, Q4/2008 Secure Biometric ID Document Management System (IDMS) for State Ministry Inteligensa, Venezuela, prime contractor Muehlbauer AG Germany, Q3/2008 National ICAO PKI Infrastructure, LDS Data Preparation and Network Security Sybsystem for the new epassport of the Republic of Serbia - National bank of Serbia, The Institute for Manufacturing Banknotes and Coins, Republic of Serbia, Q2/2008 Co-branded PKI Payment Card Issuing System - Diners International Serbia and Serbian Chamber of Commerce, Q2/2008 Government Secure Electronic ID Issuing System: system delivery and consulting services - State Agency, Country in South African region (undisclosed), Q1/2008 Secure Biometric ID Document Management System (IDMS) and National epassport Register, Country in North African region (undisclosed), Q4/2007 Smart Chip Coding Solutions for Government ID and Welfare JavaCard solutions, Komsco - National Mint Company, Seoul, South Korea, 2007 Secure Data management and reporting, Mobicom - VIP Mobile operator Macedonia, 2007 Secure Data management and reporting, Mobicom - VIP Mobile operator Serbia, 2007 Smart Card Management and Personalization solution for Banking Smart card - Algerian Post Bank, HB Technology, Algeria, 2007 Pilot Biometric Smart Card Issuing System for Government of Andalusia Ravenpack Ltd, Malaga, Spain, 2006 NetSeT Global Solutions - Company Profile 2015.doc 7
8 National Identity Register and ID Document Management System for Macedonian ICAO e-passports, National ID and DL Ministry of Interior, Republic of Macedonia, prime contractor G&D, Germany, 2006 National PKI infrastructure and ID Management System for Macedonian ICAO e- Passport Issuing system, Ministry of Interior, Republic of Macedonia, prime contractor G&D, Germany, 2006 National Root Certification Authority Serbian Ministry of Science, 2006 PKI system for Secure e-business Serbian Chamber of Commerce, 2006 ID Data Preparation and Management, Key Management system for the Citizen eid and epassport project - Ministry of Internal Affairs of the Republic of Serbia, prime contractor G&D, Germany, 2005 Smart card Applications, Data Preparation and Security System for the National Biometrical ID documents (ID, Employee eid, DL, VL, WCL, MRTD) of the Serbian Ministry of Internal Affairs, prime contractor G&D, Germany, 2004 Secure application system for Serbian smart card ID Issuing Network - Ministry of Internal Affairs of the Republic of Serbia, 2004 PKI system and Software Security Solutions Ministry of Internal Affairs of the Republic of Serbia, 2004 NetSeT Global Solutions - Company Profile 2015.doc 8
9 3. Selected publications R.Popovic at all: eid Key Enabler for Secure egovernment, ID WORLD, Sixth EMEA Summit on strategic topic of Identification, Abu Dhabi, UAE, 2013 D.Milicev: Model-Driven Development with Executable UML, WILEY Publishing Inc, ISBN , USA, 2009 Z.Savic: Identity Solution Practical Lessons Learned from Serbian Chamber of Commerce Implementation, ID WORLD 2008, WORLD, Milan, Italy, 2008 D.Milicev, A.Markovic, Z.Savic et all: Model-Driven Development of Large-Scale eid Document Issuance and Management, e-smart 2007 World e-id Conference, Sophia Antipolis, French Riviera, 2007 Z.Savic: Secure eid Management Architectures, EEMA/ENISA The European e- Identity Conference, Paris, France, 2007 Z.Savic: eidis + - Electronic Document Issuing System Architecture, EEMA European e-id Card Conference, Brussels, Belgium, 2006 Z.Savic: End-to-End Trusted eid Issuing and Verification, Canadian Security Mission in Europe, Z.Savic: Secure Issuing System for Smart Card based eid and ICAO epassports, Thales e-security Conference, Berlin 2006 M.Markovic, Z.Savic, B.Kovacevic: Secure Mobile Health Systems: Principles and Solutions, M-Health Emerging Mobile Health Systems pp , ISBN: , Springer Publisher 2006 Z.Savić, M.Marković, Development of Secure Web Financial Services in Serbia, Proceedings of Information Security Solution Europe Conference, ISSE 2003, Vienna, October 7-9, M.Marković, G.Đorđević, T.Unkašević, On Optimizing RSA Algorithm Implementation on Signal Processor Regarding Asymmetric Private Key Length, in Proc. of WISP 2003, Sept., 3-6, 2003, Budapest, Hungary. G.Đorđević, T.Unkašević, M.Marković, Optimization of Modular Reduction Procedure in RSA Algorithm Implementation on Assembler of TMS320C54x Signal Processors, DSP 2002, July, 2002, Santorini, Greece. M.Marković, T.Unkašević, G.Đorđević, RSA Algorithm Optimization on Assembler of TI TMS320C54x Signal Processors, EUSIPCO 2002, Toulouse, France, Sept. 3-6, M.Marković, G.Đorđević, T.Unkašević, Influence of Key Length in Possible Optimization of RSA Algorithm Implementation on Signal Processor, in Proc. of ICEST 2002, Oct., 1-4, 2002 NetSeT Global Solutions - Company Profile 2015.doc 9
10 Z.Savić, A.Nikolić, M.Marković, Cryptographic Proxy Gateways in Securing TCP/IP Computer Networks, Information Security Solution Europe Conference, ISSE 2001, London, September 26-28, M.Marković, Z.Savić, Ž.Obrenović, A.Nikolić, A PC Cryptographic Coprocessor based on TI Signal Processor and Smart Card System, Communications and Multimedia Security Issues of the New Century, R.Steinmetz, J.Dittman, M. Steinebach, Eds., Kluwer Academic Publishers, 2001 IFIP TC6/TC11, Fifth Joint Working Conference on Communications and Multimedia Security, 2001, Germany NetSeT Global Solutions NetSeT Global Solutions - Company Profile 2015.doc 10
Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system
Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationPosition Paper European Citizen Card: One Pillar of Interoperable eid Success
Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.
More informationSECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise
w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationElectronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
More informationBest Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationSub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013
Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document
More informationPublic Key Directory: What is the PKD and How to Make Best Use of It
Public Key Directory: What is the PKD and How to Make Best Use of It Christiane DerMarkar ICAO Programme Officer Public Key Directory ICAO TRIP: Building Trust in Travel Document Security 19/10/2015 Footer
More informationImplementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
More informationOberthur Technologies. A Technology Leader
Oberthur Technologies A Technology Leader Olivier Prestel, Managing Director Identity Business Unit Oberthur Technologies Identity BU 16 April 2014 1 Agenda Oberthur Technologies: a technology leader A
More informationStatewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
More informationSecurity Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
More informationCompany Overview. Iraq: Activities & Experience
Company Overview Iraq: Activities & Experience SAFE ID Solutions AG 2009 SAFE ID Management Board Omar El Gohary Executive Vice President Operations Long year leadership and operational experience with
More informationBanking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.
Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,
More informationSecurity by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
More informationIntroduction ICAO PKD
Introduction ICAO PKD Higher Travel Security Dr. Hermann Sterzinger Veridos COO October 2015 Border control with epassports Certificates exchanged: CSCA Certificates Document Signer Certificates Certificate
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationEESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
More informationLandscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
More informationIDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD
IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
More informationGlobal eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
More informationEnd-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid
ID WORLD Abu Dhabi 18-19 March 2012 Secure ID in the Digital World Dan Butnaru Product Manager Keynectis End-To-End Security, Broad Usage and Return on Investment. Three Pillars of Success for eid Organized
More informationWorld Summit on Information Society (WSIS) Forum 2013. 16 May 2013
World Summit on Information Society (WSIS) Forum 2013 Toolkit for creating ICT-based services using mobile communications for e- government services 16 May 2013 Hani Eskandar ICT Applications coordinator
More informationSicherheitsaspekte des neuen deutschen Personalausweises
Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking
More informationTransaction Security. Advisory Services
Transaction Security Advisory Services Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationDefending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
More informationORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS
ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance
More informationEgyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
More informationHow To Get Smart Cards From Atos
secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through
More informationE-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
More informationAn introduction to EJBCA and SignServer
An introduction to EJBCA and SignServer PrimeKey Solutions AB Tomas Gustavsson http://www.primekey.se tomas@primekey.se EJBCA and SignServer Euro PKI projects and use cases 1 EJBCA - Open Source Enterprise
More informationImplementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins
Implementation of e-signature in the ESCWA Region: Status and Next Steps By Matthew Perkins Understanding e-signature How do we identify ourselves online? Electronic records of real-world authenticators
More informationMicrosoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
More informationEuropean Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
More informationBiometrics for Public Sector Applications
Technical Guideline TR-03121-2 Biometrics for Public Sector Applications Part 2: Software Architecture and Application Profiles Version 2.3 Bundesamt für Sicherheit in der Informationstechnik Postfach
More informationMoving to the third generation of electronic passports
Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader
More informationeid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
More informationCryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
More informationSecure Cloud Identity Wallet
1 CREDENTIAL Secure Cloud Identity Wallet DS-02-2014 Dr. Arne Tauber u 2 CREDENTIAL Research Project Call: H2020-DS-2014-1 Acronym: CREDENTIAL Type of Action: IA Number: 653454 Partners: 12 Duration: 36
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationProposed Framework for an Interoperable Electronic Identity Management System
page 1 Proposed Framework for an Interoperable Electronic Identity Management System Amir Hayat 1, Thomas Rössler 1 Several Member States in the European Union (EU)have rolled out electronic identity (eid)
More informationISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com
More informationPUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
More informationNOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
More informationN E T C @ R D S. Smart Card and Network Solutions for the Electronification of the European Health Insurance Card
N E T C @ R D S Smart Card and Network Solutions for the Electronification of the European Health Insurance Card ehealth 2005 - Munich, April 21 st 2005 Dr. R. Tavakolian and Dr. G. Brenner Central Research
More informationInternational Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE
PRESS RELEASE 21 June 2005 International Porvoo Group Seminar in Reykjavik, 26 27 May 2005: DEVELOPING ELECTRONIC IDENTITY IS A PAN-EUROPEAN CHALLENGE Around 80 representatives from 18 European countries,
More informationIdentity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy
Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information
More informationHSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
More informationCOMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES
COMMON CERTIFICATE POLICY FOR THE EXTENDED ACCESS CONTROL INFRASTRUCTURE FOR PASSPORTS AND TRAVEL DOCUMENTS ISSUED BY EU MEMBER STATES BSI TR-03139 Version 2.1 27 May 2013 Foreword The present document
More informationState of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
More informationFederal e-government Agenda: Authentication and Identity Management
Federal e-government Agenda: Authentication and Identity Management David Temoshok Director, e-government Strategic Development GSA Office of Governmentwide Policy June 5, 2002 President s Management Agenda
More informationID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents
ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents 3 Your Personal Identity: Unique, Secure, Multifaceted Every person has individual characteristics by which
More informationWe Must Comply with International Requirements! Introducing Biometric ID Cards in France
We Must Comply with International Requirements! Introducing Biometric ID Cards in France Meryem Marzouki CNRS - LIP6/PolyTIC / IRIS Meryem.Marzouki@iris.sgdg.org www.iris.sgdg.org Terrorizing Privacy?
More informationSERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
More informationDigital Signatures and Interoperability
Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationDescription of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
More informationElectronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta sanna.suoranta@aalto.fi Content
More informationTHE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
More informationGENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
More informationVeridos Protects Identities. The expert for worldwide government solutions
Veridos Protects Identities The expert for worldwide government solutions 2 Personal identity in a globalized world Today s globalized world is fast, mobile, and highly virtualized. We now expect access
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationDiscover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
More informationThe Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority
The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority Dr. Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, United Arab Emirates Abstract Digital
More informationStrong Authentication for Future Web Applications
Strong Authentication for Future Web Applications Chris Williams Leidos, Inc. July 18, 2014 For W3C Identity in the Browser Workshop Abstract Leidos (formerly SAIC), has been using strong authentication
More informationTentative Action Plan
Republic of Serbia Ministry of Science and Environmental Protection Serbia and Montenegro Tentative Action Plan Draft 1 Belgrade, September 2005 Tentative Action Plan - Draft 1 Section 1 and 2 Information
More informationHungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548
More informationMulti-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
More informationIDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities
IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities Morpho Driver s license Solution for governments and road traffic authorities Governments are looking for an
More informationOperational and Technical security of Electronic Passports
European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, Legal
More informationFAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
More informationAdvanced Card Systems Ltd.
Issue Date: 17 Jan 2007 Publication: Frost & Sullivan (http://www.frost.com/prod/servlet/market-insight-top.pag?docid=92710322) By Jafizwaty Ishahak, Program Manager, Smart Cards and Auto ID, APAC Mr.
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationNIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
More informationFAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
More informationgoberlin a Trusted Cloud Marketplace for Governmental and Commercial Services
goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services Data Protection and Security Considerations in an egovernment Cloud in Germany Dr. Klaus-Peter Eckert Public Sector Cloud Forum
More informationAn Open Source eid Simulator Open Identity Summit 9th -11th September 2013
An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community
More informationON IDENTITY CARDS. Based on Article 65 (1) of the Constitution of the Republic of Kosovo, LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS
LAW Nо. 05/L-015 ON IDENTITY CARDS The Assembly of the Republic of Kosovo, Based on Article 65 (1) of the Constitution of the Republic of Kosovo, Approves LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS
More informationIPA National Programme 2008 Part II Bosnia and Herzegovina Fiche 16: Citizen Identification Protection System
IPA National Programme 2008 Part II Bosnia and Herzegovina Fiche 16: Citizen Identification Protection System 1. Basic information 1.1 CRIS Number: 2008/20-339 1.2 Title: Consolidation of Citizen Identification
More informationIDENTITY & SECURITY MAKING LIFE SAFER AND EASIER
IDENTITY & SECURITY MAKING LIFE SAFER AND EASIER IN A NUTSHELL SAFRAN IDENTITY & SECURITY Safran Identity & Security is a global leader in identity and security solutions for an increasingly digital and
More informationTELECOMMUNICATION NETWORKS
THE USE OF INFORMATION TECHNOLOGY STANDARDS TO SECURE TELECOMMUNICATION NETWORKS John Snare * Manager Telematic and Security Systems Section Telecom Australia Research Laboratories Victoria TELECOMMUNICATIONS
More informationWhat is the Right Security Solution for Mobile Computing? #RSAC
SESSION ID: SPO1-T09 Trust in Mobile Enterprise Have We Lost the Game? MODERATOR: Prof. Dr. Norbert Pohlmann Professor Computer Science Department for Information Security, Director of the Institute for
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationThe DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
More informationI N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
More informationCASQUE SNR Presentation 16 th April 2015
Presentation 16 th April 2015 What is it Distributed Management Systems Innovative Methodology from UK owned company with accompanying Protocol that allows Key Generation, Key Distribution and Key Change
More informationBreeder documents closing the gap in the identity management chain. Christian Wagner VP SDM Government Washington, March 23, 2015
Breeder documents closing the gap in the identity management chain Christian Wagner VP SDM Government Washington, March 23, 2015 INTERNET OF THINGS IS RISING Five-Year (2014-2019) CAGR 57% 2014, Business
More informationOffice Rents map EUROPE, MIDDLE EAST AND AFRICA. Accelerating success.
Office Rents map EUROPE, MIDDLE EAST AND AFRICA Accelerating success. FINLAND EMEA Office Rents H2 212 NORWAY Oslo 38.3 5.4% 7.% 295, SWEDEN Stockholm 44.7 4.5% 3.% 5, Tallinn 13.4 44,2 21. 5.25% 1.% 12,
More informationEXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
More informationOptical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
More informationICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
More informationAudio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
More informationI N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
More informationSecure egovernment Where convenience meets security. www.infineon.com/ccs
Secure egovernment Where convenience meets security www.infineon.com/ccs Gaining transparency Electronic ID documents replace and enhance conventional ID documents that governments have been issuing for
More informationTowards Federated e-identity Management across GCC A Solution s framework
Towards Federated e-identity Management across GCC A Solution s framework Ali M. Al-Khouri* and Malik Bechlaghem ** * Emirates Identity Authority, Abu Dhabi, UAE. (ali.alkhouri@emiratesid.ae) ** Logica
More information