SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
 By 2020
    all public services shall have
     their electronic counterparts;
    An average of 12 new
     electronic services shall be
     implemented and launched
     every year;
    An average of 8 backoffice
     processes should be digitized
     every year;
    50% adoption of electronic
     public services shall be
     reached;
 Existing information system
  shall be rationalized and
  integrated into governmental
  data interchange framework.
• In the physical world we
  officially identify our self
  using the national identity
  card;
• The identity card has a
  picture of the card owner
  printed on and due to
  physical presence of the
  person at the service
  counter the officer can use
  it for identification.
• Identification in cyberspace is different since:
   – The person is NOT physically present at the service counter
     therefore it is impossible to prove the identity using the picture
     printed on id card;
   – In cyberspace services are virtual and there is no humans
     interacting directly with citizens;
• As of today our national id card cannot be used as an
  identification tool in virtual space.

• Identity management is a term related to how humans are
  identified, authenticated and authorized across computer
  networks and systems. It covers issues such as how users
  are given an identity, the protection of that identity, and
  the technologies supporting that protection (e.g., network
  protocols, digital certificates, passwords, etc.).
• In order to enable e-services there is a clear
  need to develop and implement an identity
  management and authentication framework
  which is:
  – Secure & Reliable – uniquely identifies users and
    offers highest level of security known as of today;
  – Efficient – is highly re-usable, has low total cost of
    ownership (TCO) and could be implemented and
    launched in reasonable timeframe;
  – Accessible – is affordable for businesses of all
    types and sizes as well as ordinary citizens.
A. Services    B. Services
for citizens   for government
and business   itself




                C. Reusable
                platform-level
                services
• U/P Authentication
  – is one factor authentication mechanism based on
    knowledge of secret password;
  – uses credentials consisting of personal numeric
    identifier (IDNP) as username and a secret and
    securely distributed password;
  – Is based on National Register of Population.
• eID Authentication
   – is one factor authentication mechanism,
     based on possession of a smart card with
     unique personalized digital certificate on it;
   – in majority of cases it is combined with
     knowledge factor to obtain two factor
     authentication (so called strong
     authentication);
   – provides highest level of security as of
     today;
   – in most cases requires additional hardware
     and software components;
   – requires a complex infrastructure (known as
     PKI) considering technical, organizational
     and legal aspects, therefore …
   – implementation takes long time.
Moldova implemented PKI infrastructure and institutionalized CTS as CA
level 2 in July 2006. As of today, CTS is the only CA L2 in our country.

                                       prices, MDL
                 Type of DS kit
                                   … 2010       2010 …
           Qualified DC              1570.00       885.00
           Unqualified DC             400.00       250.00



According to current legislation the validity period of a qualified digital
certificate is 1 year.
                                              1900

                                                       public sector
                                                       citizen
                                                       private sector

              4050                                50


The number of public electronic services offered to citizens and using
digital signature is 1 (submission of tax declaration).
• Mobile eID works on the same
  principles as eID, but:
  – it does not require smart cards and
    card readers, instead it uses mobile
    phones;
  – In mobile eID infrastructure the
    cryptographic material is stored on
    the Subscriber Identity Module         Mobile penetration in
    (SIM) card which contains PKI          Moldova is close to
                                           94%, and there are
    functionality.                         more than 3 million
                                           subscribers to mobile
                                           services
• In January the Government will sign
  agreements with mobile network
  operators on implementing Mobile eID;
• In March the Authentication and Control
  Service will be launched as part of G2C
  Portal;
• Identify new accessible alternatives for
  authentication;
• Review of the pricing model for traditional
  eID on smart cards;
• Develop more e-services using strong
  authentication and digital signature.
Identity management in government, mr. iurie turcanu

Contenu connexe

Tendances

PKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management SystemsPKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management Systems
Arab Federation for Digital Economy
 

Tendances (20)

Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
 
Triggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply ChainTriggering the Smart Card Readers Supply Chain
Triggering the Smart Card Readers Supply Chain
 
eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
Uid management-system
Uid management-systemUid management-system
Uid management-system
 
FinX Digital Wallet Platform
FinX Digital Wallet PlatformFinX Digital Wallet Platform
FinX Digital Wallet Platform
 
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
 
Introduction to India Stack v1.2
Introduction to India Stack v1.2Introduction to India Stack v1.2
Introduction to India Stack v1.2
 
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileIDEstonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
 
A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
Aadhar
AadharAadhar
Aadhar
 
E-signing-3
E-signing-3E-signing-3
E-signing-3
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Evolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and PaymentsEvolving E-governance Trends in Digital Identity, Services and Payments
Evolving E-governance Trends in Digital Identity, Services and Payments
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
Information act 2000
Information act 2000Information act 2000
Information act 2000
 
The Aadhaar Act, 2016
The Aadhaar Act, 2016The Aadhaar Act, 2016
The Aadhaar Act, 2016
 
A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)
 
PKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management SystemsPKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management Systems
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 

En vedette

CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CloudIDSummit
 

En vedette (6)

Logistics Case Study
Logistics Case StudyLogistics Case Study
Logistics Case Study
 
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
CIS14: NSTIC - Identity and Access Management Collaborative Approaches to Nov...
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLCDevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
 
Amazon Case Study
Amazon Case Study Amazon Case Study
Amazon Case Study
 
Lean Logistics Operations Process Map
Lean Logistics Operations Process MapLean Logistics Operations Process Map
Lean Logistics Operations Process Map
 

Similaire à Identity management in government, mr. iurie turcanu

Similaire à Identity management in government, mr. iurie turcanu (20)

PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDASPPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
 
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
23.08.2010, Mongolian digital signature law gateway to the global digital eco...23.08.2010, Mongolian digital signature law gateway to the global digital eco...
23.08.2010, Mongolian digital signature law gateway to the global digital eco...
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
World Digital Finance Hub.pptx
World Digital Finance Hub.pptxWorld Digital Finance Hub.pptx
World Digital Finance Hub.pptx
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Digital signature
Digital signatureDigital signature
Digital signature
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
 
IoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair DukeIoT device attestation system using blockchain, Alistair Duke
IoT device attestation system using blockchain, Alistair Duke
 
E goverance project
E goverance projectE goverance project
E goverance project
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdf
 
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
CM Breakfast: itsme by Belgian Mobile ID  (may 2018)CM Breakfast: itsme by Belgian Mobile ID  (may 2018)
CM Breakfast: itsme by Belgian Mobile ID (may 2018)
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
04_Zetes.pptx
04_Zetes.pptx04_Zetes.pptx
04_Zetes.pptx
 
Indjic fintech module 3
Indjic fintech module 3Indjic fintech module 3
Indjic fintech module 3
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 

Plus de E-Government Center Moldova

The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
E-Government Center Moldova
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariuc
E-Government Center Moldova
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
E-Government Center Moldova
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...
E-Government Center Moldova
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
E-Government Center Moldova
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur riel
E-Government Center Moldova
 

Plus de E-Government Center Moldova (20)

The new era of smart
The new era of smart The new era of smart
The new era of smart
 
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 
Digital Transformation by Richard Baird
Digital Transformation by Richard BairdDigital Transformation by Richard Baird
Digital Transformation by Richard Baird
 
Mpay&Mcloud
Mpay&McloudMpay&Mcloud
Mpay&Mcloud
 
Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013
 
Hannes astok data protection agency
Hannes astok data protection agencyHannes astok data protection agency
Hannes astok data protection agency
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariuc
 
Hannes astok policy development
Hannes astok policy developmentHannes astok policy development
Hannes astok policy development
 
Digital security hannes astok
Digital security hannes astokDigital security hannes astok
Digital security hannes astok
 
Assessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto VeldreAssessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto Veldre
 
MCloud operational framework
MCloud operational frameworkMCloud operational framework
MCloud operational framework
 
Arhitectura de securitate_MCloud
Arhitectura de securitate_MCloudArhitectura de securitate_MCloud
Arhitectura de securitate_MCloud
 
Ibm smart cloud solutions m-cloud
Ibm smart cloud solutions   m-cloudIbm smart cloud solutions   m-cloud
Ibm smart cloud solutions m-cloud
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...
 
Star storage m cloud week
Star storage m cloud weekStar storage m cloud week
Star storage m cloud week
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur riel
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Identity management in government, mr. iurie turcanu

  • 1.
  • 2.
  • 3.  By 2020  all public services shall have their electronic counterparts;  An average of 12 new electronic services shall be implemented and launched every year;  An average of 8 backoffice processes should be digitized every year;  50% adoption of electronic public services shall be reached;  Existing information system shall be rationalized and integrated into governmental data interchange framework.
  • 4. • In the physical world we officially identify our self using the national identity card; • The identity card has a picture of the card owner printed on and due to physical presence of the person at the service counter the officer can use it for identification.
  • 5. • Identification in cyberspace is different since: – The person is NOT physically present at the service counter therefore it is impossible to prove the identity using the picture printed on id card; – In cyberspace services are virtual and there is no humans interacting directly with citizens; • As of today our national id card cannot be used as an identification tool in virtual space. • Identity management is a term related to how humans are identified, authenticated and authorized across computer networks and systems. It covers issues such as how users are given an identity, the protection of that identity, and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
  • 6. • In order to enable e-services there is a clear need to develop and implement an identity management and authentication framework which is: – Secure & Reliable – uniquely identifies users and offers highest level of security known as of today; – Efficient – is highly re-usable, has low total cost of ownership (TCO) and could be implemented and launched in reasonable timeframe; – Accessible – is affordable for businesses of all types and sizes as well as ordinary citizens.
  • 7. A. Services B. Services for citizens for government and business itself C. Reusable platform-level services
  • 8.
  • 9. • U/P Authentication – is one factor authentication mechanism based on knowledge of secret password; – uses credentials consisting of personal numeric identifier (IDNP) as username and a secret and securely distributed password; – Is based on National Register of Population.
  • 10. • eID Authentication – is one factor authentication mechanism, based on possession of a smart card with unique personalized digital certificate on it; – in majority of cases it is combined with knowledge factor to obtain two factor authentication (so called strong authentication); – provides highest level of security as of today; – in most cases requires additional hardware and software components; – requires a complex infrastructure (known as PKI) considering technical, organizational and legal aspects, therefore … – implementation takes long time.
  • 11. Moldova implemented PKI infrastructure and institutionalized CTS as CA level 2 in July 2006. As of today, CTS is the only CA L2 in our country. prices, MDL Type of DS kit … 2010 2010 … Qualified DC 1570.00 885.00 Unqualified DC 400.00 250.00 According to current legislation the validity period of a qualified digital certificate is 1 year. 1900 public sector citizen private sector 4050 50 The number of public electronic services offered to citizens and using digital signature is 1 (submission of tax declaration).
  • 12. • Mobile eID works on the same principles as eID, but: – it does not require smart cards and card readers, instead it uses mobile phones; – In mobile eID infrastructure the cryptographic material is stored on the Subscriber Identity Module Mobile penetration in (SIM) card which contains PKI Moldova is close to 94%, and there are functionality. more than 3 million subscribers to mobile services
  • 13. • In January the Government will sign agreements with mobile network operators on implementing Mobile eID; • In March the Authentication and Control Service will be launched as part of G2C Portal; • Identify new accessible alternatives for authentication; • Review of the pricing model for traditional eID on smart cards; • Develop more e-services using strong authentication and digital signature.