SlideShare a Scribd company logo
 By 2020
    all public services shall have
     their electronic counterparts;
    An average of 12 new
     electronic services shall be
     implemented and launched
     every year;
    An average of 8 backoffice
     processes should be digitized
     every year;
    50% adoption of electronic
     public services shall be
     reached;
 Existing information system
  shall be rationalized and
  integrated into governmental
  data interchange framework.
• In the physical world we
  officially identify our self
  using the national identity
  card;
• The identity card has a
  picture of the card owner
  printed on and due to
  physical presence of the
  person at the service
  counter the officer can use
  it for identification.
• Identification in cyberspace is different since:
   – The person is NOT physically present at the service counter
     therefore it is impossible to prove the identity using the picture
     printed on id card;
   – In cyberspace services are virtual and there is no humans
     interacting directly with citizens;
• As of today our national id card cannot be used as an
  identification tool in virtual space.

• Identity management is a term related to how humans are
  identified, authenticated and authorized across computer
  networks and systems. It covers issues such as how users
  are given an identity, the protection of that identity, and
  the technologies supporting that protection (e.g., network
  protocols, digital certificates, passwords, etc.).
• In order to enable e-services there is a clear
  need to develop and implement an identity
  management and authentication framework
  which is:
  – Secure & Reliable – uniquely identifies users and
    offers highest level of security known as of today;
  – Efficient – is highly re-usable, has low total cost of
    ownership (TCO) and could be implemented and
    launched in reasonable timeframe;
  – Accessible – is affordable for businesses of all
    types and sizes as well as ordinary citizens.
A. Services    B. Services
for citizens   for government
and business   itself




                C. Reusable
                platform-level
                services
• U/P Authentication
  – is one factor authentication mechanism based on
    knowledge of secret password;
  – uses credentials consisting of personal numeric
    identifier (IDNP) as username and a secret and
    securely distributed password;
  – Is based on National Register of Population.
• eID Authentication
   – is one factor authentication mechanism,
     based on possession of a smart card with
     unique personalized digital certificate on it;
   – in majority of cases it is combined with
     knowledge factor to obtain two factor
     authentication (so called strong
     authentication);
   – provides highest level of security as of
     today;
   – in most cases requires additional hardware
     and software components;
   – requires a complex infrastructure (known as
     PKI) considering technical, organizational
     and legal aspects, therefore …
   – implementation takes long time.
Moldova implemented PKI infrastructure and institutionalized CTS as CA
level 2 in July 2006. As of today, CTS is the only CA L2 in our country.

                                       prices, MDL
                 Type of DS kit
                                   … 2010       2010 …
           Qualified DC              1570.00       885.00
           Unqualified DC             400.00       250.00



According to current legislation the validity period of a qualified digital
certificate is 1 year.
                                              1900

                                                       public sector
                                                       citizen
                                                       private sector

              4050                                50


The number of public electronic services offered to citizens and using
digital signature is 1 (submission of tax declaration).
• Mobile eID works on the same
  principles as eID, but:
  – it does not require smart cards and
    card readers, instead it uses mobile
    phones;
  – In mobile eID infrastructure the
    cryptographic material is stored on
    the Subscriber Identity Module         Mobile penetration in
    (SIM) card which contains PKI          Moldova is close to
                                           94%, and there are
    functionality.                         more than 3 million
                                           subscribers to mobile
                                           services
• In January the Government will sign
  agreements with mobile network
  operators on implementing Mobile eID;
• In March the Authentication and Control
  Service will be launched as part of G2C
  Portal;
• Identify new accessible alternatives for
  authentication;
• Review of the pricing model for traditional
  eID on smart cards;
• Develop more e-services using strong
  authentication and digital signature.
Identity management in government, mr. iurie turcanu

More Related Content

What's hot

Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Rohan Nyayadhish
 
Triggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply ChainTriggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply Chain
Arab Federation for Digital Economy
 
eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
SafeNet
 
Uid management-system
Uid management-systemUid management-system
Uid management-system
majorravi
 
FinX Digital Wallet Platform
FinX Digital Wallet PlatformFinX Digital Wallet Platform
FinX Digital Wallet Platform
Anurag Rastogi
 
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
Kullarat Phongsathaporn
 
Introduction to India Stack v1.2
Introduction to India Stack v1.2Introduction to India Stack v1.2
Introduction to India Stack v1.2
Anuj Magazine
 
A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)
Kullarat Phongsathaporn
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
Gareth Niblett
 
Aadhar
AadharAadhar
Aadhar
nikhar29
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
 
Evolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and PaymentsEvolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and Payments
Abhishek Syal
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
saipriyadonthula
 
Information act 2000
Information act 2000Information act 2000
Information act 2000
ASHAAJAYAKUMAR2
 
The Aadhaar Act, 2016
The Aadhaar Act, 2016The Aadhaar Act, 2016
The Aadhaar Act, 2016
Dr. Gagandeep Kaur
 
A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)
Kullarat Phongsathaporn
 
PKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management SystemsPKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management Systems
Arab Federation for Digital Economy
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
Belgian Mobile ID - itsme
 

What's hot (20)

Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
 
Triggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply ChainTriggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply Chain
 
eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
Uid management-system
Uid management-systemUid management-system
Uid management-system
 
FinX Digital Wallet Platform
FinX Digital Wallet PlatformFinX Digital Wallet Platform
FinX Digital Wallet Platform
 
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
 
Introduction to India Stack v1.2
Introduction to India Stack v1.2Introduction to India Stack v1.2
Introduction to India Stack v1.2
 
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileIDEstonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
 
A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
Aadhar
AadharAadhar
Aadhar
 
E-signing-3
E-signing-3E-signing-3
E-signing-3
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Evolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and PaymentsEvolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and Payments
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
Information act 2000
Information act 2000Information act 2000
Information act 2000
 
The Aadhaar Act, 2016
The Aadhaar Act, 2016The Aadhaar Act, 2016
The Aadhaar Act, 2016
 
A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)
 
PKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management SystemsPKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management Systems
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 

Viewers also liked

Logistics Case Study
Logistics Case StudyLogistics Case Study
Logistics Case Study
Donald Cross
 
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CloudIDSummit
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
Alain Ducass
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
CA Technologies
 
Amazon Case Study
Amazon Case Study Amazon Case Study
Amazon Case Study
LogisticCaseStudies
 
Lean Logistics Operations Process Map
Lean Logistics Operations Process MapLean Logistics Operations Process Map
Lean Logistics Operations Process Map
LeanCor Supply Chain Group
 

Viewers also liked (6)

Logistics Case Study
Logistics Case StudyLogistics Case Study
Logistics Case Study
 
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 
Amazon Case Study
Amazon Case Study Amazon Case Study
Amazon Case Study
 
Lean Logistics Operations Process Map
Lean Logistics Operations Process MapLean Logistics Operations Process Map
Lean Logistics Operations Process Map
 

Similar to Identity management in government, mr. iurie turcanu

PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDASPPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
Support for Improvement in Governance and Management SIGMA
 
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
23.08.2010, Mongolian digital signature law gateway to the global digital eco...23.08.2010, Mongolian digital signature law gateway to the global digital eco...
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
The Business Council of Mongolia
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
Chas Yap
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
Rexcy
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
FIDO Alliance
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
Support for Improvement in Governance and Management SIGMA
 
World Digital Finance Hub.pptx
World Digital Finance Hub.pptxWorld Digital Finance Hub.pptx
World Digital Finance Hub.pptx
ElbekXolmatov
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
2coolshivani
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
cscpconf
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
Napier University
 
E goverance project
E goverance projectE goverance project
E goverance project
Saloni Garg
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdf
Xtratrust Digisign Pvt ltd
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM.com
 
Demonstrating European Digital Identity Wallets
Demonstrating European Digital Identity WalletsDemonstrating European Digital Identity Wallets
Demonstrating European Digital Identity Wallets
Lal Chandran
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
Arab Federation for Digital Economy
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
Future Agenda
 
04_Zetes.pptx
04_Zetes.pptx04_Zetes.pptx
04_Zetes.pptx
FinTech Belgium
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
Drago Indjic
 

Similar to Identity management in government, mr. iurie turcanu (20)

PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDASPPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
 
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
23.08.2010, Mongolian digital signature law gateway to the global digital eco...23.08.2010, Mongolian digital signature law gateway to the global digital eco...
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
World Digital Finance Hub.pptx
World Digital Finance Hub.pptxWorld Digital Finance Hub.pptx
World Digital Finance Hub.pptx
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Digital signature
Digital signatureDigital signature
Digital signature
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
E goverance project
E goverance projectE goverance project
E goverance project
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdf
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
 
Demonstrating European Digital Identity Wallets
Demonstrating European Digital Identity WalletsDemonstrating European Digital Identity Wallets
Demonstrating European Digital Identity Wallets
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
04_Zetes.pptx
04_Zetes.pptx04_Zetes.pptx
04_Zetes.pptx
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 

More from E-Government Center Moldova

The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsE-Government Center Moldova
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucE-Government Center Moldova
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterE-Government Center Moldova
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...E-Government Center Moldova
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranE-Government Center Moldova
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielE-Government Center Moldova
 

More from E-Government Center Moldova (20)

The new era of smart
The new era of smart The new era of smart
The new era of smart
 
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 
Digital Transformation by Richard Baird
Digital Transformation by Richard BairdDigital Transformation by Richard Baird
Digital Transformation by Richard Baird
 
Mpay&Mcloud
Mpay&McloudMpay&Mcloud
Mpay&Mcloud
 
Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013
 
Hannes astok data protection agency
Hannes astok data protection agencyHannes astok data protection agency
Hannes astok data protection agency
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariuc
 
Hannes astok policy development
Hannes astok policy developmentHannes astok policy development
Hannes astok policy development
 
Digital security hannes astok
Digital security hannes astokDigital security hannes astok
Digital security hannes astok
 
Assessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto VeldreAssessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto Veldre
 
MCloud operational framework
MCloud operational frameworkMCloud operational framework
MCloud operational framework
 
Arhitectura de securitate_MCloud
Arhitectura de securitate_MCloudArhitectura de securitate_MCloud
Arhitectura de securitate_MCloud
 
Ibm smart cloud solutions m-cloud
Ibm smart cloud solutions   m-cloudIbm smart cloud solutions   m-cloud
Ibm smart cloud solutions m-cloud
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...
 
Star storage m cloud week
Star storage m cloud weekStar storage m cloud week
Star storage m cloud week
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur riel
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Identity management in government, mr. iurie turcanu

  • 1.
  • 2.
  • 3.  By 2020  all public services shall have their electronic counterparts;  An average of 12 new electronic services shall be implemented and launched every year;  An average of 8 backoffice processes should be digitized every year;  50% adoption of electronic public services shall be reached;  Existing information system shall be rationalized and integrated into governmental data interchange framework.
  • 4. • In the physical world we officially identify our self using the national identity card; • The identity card has a picture of the card owner printed on and due to physical presence of the person at the service counter the officer can use it for identification.
  • 5. • Identification in cyberspace is different since: – The person is NOT physically present at the service counter therefore it is impossible to prove the identity using the picture printed on id card; – In cyberspace services are virtual and there is no humans interacting directly with citizens; • As of today our national id card cannot be used as an identification tool in virtual space. • Identity management is a term related to how humans are identified, authenticated and authorized across computer networks and systems. It covers issues such as how users are given an identity, the protection of that identity, and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
  • 6. • In order to enable e-services there is a clear need to develop and implement an identity management and authentication framework which is: – Secure & Reliable – uniquely identifies users and offers highest level of security known as of today; – Efficient – is highly re-usable, has low total cost of ownership (TCO) and could be implemented and launched in reasonable timeframe; – Accessible – is affordable for businesses of all types and sizes as well as ordinary citizens.
  • 7. A. Services B. Services for citizens for government and business itself C. Reusable platform-level services
  • 8.
  • 9. • U/P Authentication – is one factor authentication mechanism based on knowledge of secret password; – uses credentials consisting of personal numeric identifier (IDNP) as username and a secret and securely distributed password; – Is based on National Register of Population.
  • 10. • eID Authentication – is one factor authentication mechanism, based on possession of a smart card with unique personalized digital certificate on it; – in majority of cases it is combined with knowledge factor to obtain two factor authentication (so called strong authentication); – provides highest level of security as of today; – in most cases requires additional hardware and software components; – requires a complex infrastructure (known as PKI) considering technical, organizational and legal aspects, therefore … – implementation takes long time.
  • 11. Moldova implemented PKI infrastructure and institutionalized CTS as CA level 2 in July 2006. As of today, CTS is the only CA L2 in our country. prices, MDL Type of DS kit … 2010 2010 … Qualified DC 1570.00 885.00 Unqualified DC 400.00 250.00 According to current legislation the validity period of a qualified digital certificate is 1 year. 1900 public sector citizen private sector 4050 50 The number of public electronic services offered to citizens and using digital signature is 1 (submission of tax declaration).
  • 12. • Mobile eID works on the same principles as eID, but: – it does not require smart cards and card readers, instead it uses mobile phones; – In mobile eID infrastructure the cryptographic material is stored on the Subscriber Identity Module Mobile penetration in (SIM) card which contains PKI Moldova is close to 94%, and there are functionality. more than 3 million subscribers to mobile services
  • 13. • In January the Government will sign agreements with mobile network operators on implementing Mobile eID; • In March the Authentication and Control Service will be launched as part of G2C Portal; • Identify new accessible alternatives for authentication; • Review of the pricing model for traditional eID on smart cards; • Develop more e-services using strong authentication and digital signature.