 By 2020    all public services shall have     their electronic counterparts;    An average of 12 new     electronic se...
• In the physical world we  officially identify our self  using the national identity  card;• The identity card has a  pic...
• Identification in cyberspace is different since:   – The person is NOT physically present at the service counter     the...
• In order to enable e-services there is a clear  need to develop and implement an identity  management and authentication...
A. Services    B. Servicesfor citizens   for governmentand business   itself                C. Reusable                pla...
• U/P Authentication  – is one factor authentication mechanism based on    knowledge of secret password;  – uses credentia...
• eID Authentication   – is one factor authentication mechanism,     based on possession of a smart card with     unique p...
Moldova implemented PKI infrastructure and institutionalized CTS as CAlevel 2 in July 2006. As of today, CTS is the only C...
• Mobile eID works on the same  principles as eID, but:  – it does not require smart cards and    card readers, instead it...
• In January the Government will sign  agreements with mobile network  operators on implementing Mobile eID;• In March the...
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
Upcoming SlideShare
Loading in …5
×

Identity management in government, mr. iurie turcanu

911 views

Published on

A view of Identity Management within the Moldovan Government. Presentation held by Mr. Iurie Turcanu, CTO at e-Government Center, within the first session of the FORUM „INFORMATION TECHNOLOGY IN GOVERNMENT”, dedicated to interoperability, held at Chisinau, January 16th 2012.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
911
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Identity management in government, mr. iurie turcanu

  1. 1.  By 2020  all public services shall have their electronic counterparts;  An average of 12 new electronic services shall be implemented and launched every year;  An average of 8 backoffice processes should be digitized every year;  50% adoption of electronic public services shall be reached; Existing information system shall be rationalized and integrated into governmental data interchange framework.
  2. 2. • In the physical world we officially identify our self using the national identity card;• The identity card has a picture of the card owner printed on and due to physical presence of the person at the service counter the officer can use it for identification.
  3. 3. • Identification in cyberspace is different since: – The person is NOT physically present at the service counter therefore it is impossible to prove the identity using the picture printed on id card; – In cyberspace services are virtual and there is no humans interacting directly with citizens;• As of today our national id card cannot be used as an identification tool in virtual space.• Identity management is a term related to how humans are identified, authenticated and authorized across computer networks and systems. It covers issues such as how users are given an identity, the protection of that identity, and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
  4. 4. • In order to enable e-services there is a clear need to develop and implement an identity management and authentication framework which is: – Secure & Reliable – uniquely identifies users and offers highest level of security known as of today; – Efficient – is highly re-usable, has low total cost of ownership (TCO) and could be implemented and launched in reasonable timeframe; – Accessible – is affordable for businesses of all types and sizes as well as ordinary citizens.
  5. 5. A. Services B. Servicesfor citizens for governmentand business itself C. Reusable platform-level services
  6. 6. • U/P Authentication – is one factor authentication mechanism based on knowledge of secret password; – uses credentials consisting of personal numeric identifier (IDNP) as username and a secret and securely distributed password; – Is based on National Register of Population.
  7. 7. • eID Authentication – is one factor authentication mechanism, based on possession of a smart card with unique personalized digital certificate on it; – in majority of cases it is combined with knowledge factor to obtain two factor authentication (so called strong authentication); – provides highest level of security as of today; – in most cases requires additional hardware and software components; – requires a complex infrastructure (known as PKI) considering technical, organizational and legal aspects, therefore … – implementation takes long time.
  8. 8. Moldova implemented PKI infrastructure and institutionalized CTS as CAlevel 2 in July 2006. As of today, CTS is the only CA L2 in our country. prices, MDL Type of DS kit … 2010 2010 … Qualified DC 1570.00 885.00 Unqualified DC 400.00 250.00According to current legislation the validity period of a qualified digitalcertificate is 1 year. 1900 public sector citizen private sector 4050 50The number of public electronic services offered to citizens and usingdigital signature is 1 (submission of tax declaration).
  9. 9. • Mobile eID works on the same principles as eID, but: – it does not require smart cards and card readers, instead it uses mobile phones; – In mobile eID infrastructure the cryptographic material is stored on the Subscriber Identity Module Mobile penetration in (SIM) card which contains PKI Moldova is close to 94%, and there are functionality. more than 3 million subscribers to mobile services
  10. 10. • In January the Government will sign agreements with mobile network operators on implementing Mobile eID;• In March the Authentication and Control Service will be launched as part of G2C Portal;• Identify new accessible alternatives for authentication;• Review of the pricing model for traditional eID on smart cards;• Develop more e-services using strong authentication and digital signature.

×