The Belgian Electronic Identity Card (Overview)
نویسندگان
چکیده
Currently, Belgium is introducing an electronic version of its identity card. In this article, we shortly describe the card, and give a brief introduction to its cryptographic features. In particular, we focus on the Public-Key Infrastructure (PKI) associated with the card.
منابع مشابه
Security and Privacy Improvements for the Belgian eID Technology
The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals. Currently, there exist some privacy and security pro...
متن کاملExtending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a limited number of citizens really use the card in electronic applications. A major reason is the lack of killer functionality and killer applications. This paper presents two reusable extensions to the Belgian eID techno...
متن کاملTowards a general purpose identity card
Many countries are currently designing or even rolling out electronic identity cards. Simultaneously, eID applications are developed. In many cases, the eID technology is initially integrated in governmental applications. Thereafter, the technology is adopted by other domains (i.e. the financial sector, eHealth services, social networking, corporate environments, ...). However, security, privac...
متن کاملeID: Identity Management in an Online World
Reliable electronic identity (eID) lies at the core of delivering successful, trustworthy online government services. Yet in the move away from paperand documentary-based forms of face-to-face identity management complex questions arise, such as “How can any user’s true identity be proven?” This paper discusses proposed ‘laws’ for identity. It outlines a need for eID models that recognise the n...
متن کاملExecutive Summary List of Contributions List of Adapid Publications Covered in This Report
This report presents the basic research results of the ADAPID project from in 2007 and 2008. It summarizes twenty research papers, most of which have been published in scientific journals of conferences, while the rest are still subject to submission or review processes. Our research results can be classified in five main areas, corresponding to each of the chapters in this report. First, we pr...
متن کامل