Italian Electronic Identity Card - principle and architecture
نویسنده
چکیده
The plan for "e-Government", and the need to facilitate interactions between citizen and Public Administration, make find in the electronic identity card EIC one of the most important means to access network services in a secure way. There are five inspiring principles: ??security for the complete lifecycle of the card from production of the physical support to initialisation, emission and its use as a service card. Security must be addressed the point of view of both police and citizen; ??network service access to bring Public Administration (at both central and local level) nearer to the citizen; ??interoperability ie compatibility of national network services by use of the same card standard open technological architecture international standard compliance and vendor independence nationwide; ??virtual centralisation for authorisation and logging operations during production and emission processes; ??full independence of local authorities (which release the EIC) to install their local services. 1 Layout and environment The EIC is an hybrid smart card with two different technologies aboard: a 16K microchip and a laser band. Due to the restricted printable area of the card, all data are written without labels. This approach allows a multilingual solution where needed, for example, in the frontier regions such as the Italian/French, Italian/Slovenian and Italian/German borders. On the first side are the name of the authority releasing the card, the personal data of the cardholder (surname, name, place and date of birth, photo and sex), a unique card ID number and the ICAO band. On the other side are the cardholder's address and fiscal code, the card's validity period and the two electronic devices: the chip and the laser band. On the laser band are replicated, in embedded hologram, personal data and images of the citizen's fingerprint (not mandatory) and holograph signature.
منابع مشابه
The Italian Electronic Identity Card: Overall Architecture and It Infrastructure
In this paper we describe the overall process of deployment of the Italian Electronic Identity Card: the way it is issued, services it is used for, organizations involved in the process, and the Information Technology (IT) infrastructure enabling the effective management of the whole process while ensuring the mandatory security functions. Organizational complexity lies in the distribution of r...
متن کاملThe Italian Electronic Identity Card: a short introduction
The italian Electronic Identity Card (EIC, for short) is a polycarbonate smart card equipped with a microchip (supporting cryptographic functions) and a laser band (featuring an embedded hologram). It contains personal (e.g. name, surname, date of birth, . . . ) and biometric data (photo and fingerprint) of a citizen. The EIC is an identity document which, according to Italian Laws, is fully eq...
متن کاملTowards a general purpose identity card
Many countries are currently designing or even rolling out electronic identity cards. Simultaneously, eID applications are developed. In many cases, the eID technology is initially integrated in governmental applications. Thereafter, the technology is adopted by other domains (i.e. the financial sector, eHealth services, social networking, corporate environments, ...). However, security, privac...
متن کاملNecessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card
The new German electronic identity card will allow service providers to access personal data stored on the card. This imposes a new quality of data processing as these data have been governmentally verified. According to European privacy legislation any data processing must be justified in the sense that the personal data are necessary for the stipulated purpose. This need-toknow principle is a...
متن کاملAuthentication and security integration for ecampus services at the university of applied sciences harz using the German electronic identity card/eid and egovernment standards
A eCampus security shell architecture was developed and deployed to improve the security of existing university management systems (legacy UMS), integrating innovative eGovernment Standards e.g. the German Electronic Identity Card (GeID), the eGovernment Protocol OSCI and qualified Signatures (QES). 1 Problem and requirements The challenge was to improve the security of an existing university m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001