A view of Identity Management within the Moldovan Government. Presentation held by Mr. Iurie Turcanu, CTO at e-Government Center, within the first session of the FORUM „INFORMATION TECHNOLOGY IN GOVERNMENT”, dedicated to interoperability, held at Chisinau, January 16th 2012.
Handwritten Text Recognition for manuscripts and early printed texts
Identity management in government, mr. iurie turcanu
1.
2.
3. By 2020
all public services shall have
their electronic counterparts;
An average of 12 new
electronic services shall be
implemented and launched
every year;
An average of 8 backoffice
processes should be digitized
every year;
50% adoption of electronic
public services shall be
reached;
Existing information system
shall be rationalized and
integrated into governmental
data interchange framework.
4. • In the physical world we
officially identify our self
using the national identity
card;
• The identity card has a
picture of the card owner
printed on and due to
physical presence of the
person at the service
counter the officer can use
it for identification.
5. • Identification in cyberspace is different since:
– The person is NOT physically present at the service counter
therefore it is impossible to prove the identity using the picture
printed on id card;
– In cyberspace services are virtual and there is no humans
interacting directly with citizens;
• As of today our national id card cannot be used as an
identification tool in virtual space.
• Identity management is a term related to how humans are
identified, authenticated and authorized across computer
networks and systems. It covers issues such as how users
are given an identity, the protection of that identity, and
the technologies supporting that protection (e.g., network
protocols, digital certificates, passwords, etc.).
6. • In order to enable e-services there is a clear
need to develop and implement an identity
management and authentication framework
which is:
– Secure & Reliable – uniquely identifies users and
offers highest level of security known as of today;
– Efficient – is highly re-usable, has low total cost of
ownership (TCO) and could be implemented and
launched in reasonable timeframe;
– Accessible – is affordable for businesses of all
types and sizes as well as ordinary citizens.
7. A. Services B. Services
for citizens for government
and business itself
C. Reusable
platform-level
services
8.
9. • U/P Authentication
– is one factor authentication mechanism based on
knowledge of secret password;
– uses credentials consisting of personal numeric
identifier (IDNP) as username and a secret and
securely distributed password;
– Is based on National Register of Population.
10. • eID Authentication
– is one factor authentication mechanism,
based on possession of a smart card with
unique personalized digital certificate on it;
– in majority of cases it is combined with
knowledge factor to obtain two factor
authentication (so called strong
authentication);
– provides highest level of security as of
today;
– in most cases requires additional hardware
and software components;
– requires a complex infrastructure (known as
PKI) considering technical, organizational
and legal aspects, therefore …
– implementation takes long time.
11. Moldova implemented PKI infrastructure and institutionalized CTS as CA
level 2 in July 2006. As of today, CTS is the only CA L2 in our country.
prices, MDL
Type of DS kit
… 2010 2010 …
Qualified DC 1570.00 885.00
Unqualified DC 400.00 250.00
According to current legislation the validity period of a qualified digital
certificate is 1 year.
1900
public sector
citizen
private sector
4050 50
The number of public electronic services offered to citizens and using
digital signature is 1 (submission of tax declaration).
12. • Mobile eID works on the same
principles as eID, but:
– it does not require smart cards and
card readers, instead it uses mobile
phones;
– In mobile eID infrastructure the
cryptographic material is stored on
the Subscriber Identity Module Mobile penetration in
(SIM) card which contains PKI Moldova is close to
94%, and there are
functionality. more than 3 million
subscribers to mobile
services
13. • In January the Government will sign
agreements with mobile network
operators on implementing Mobile eID;
• In March the Authentication and Control
Service will be launched as part of G2C
Portal;
• Identify new accessible alternatives for
authentication;
• Review of the pricing model for traditional
eID on smart cards;
• Develop more e-services using strong
authentication and digital signature.