+ All Categories
Home > Documents > TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store...

TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store...

Date post: 27-May-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
20
TOWARDS MOBILE GOVERNMENT ENSURING END-TO-END SECURITY AND PRIVACY OF IDENTITY CREDENTIALS FROM EGOV TO MGOV ID4AFRICA JOHANNESBURG JULIEN VINTROU JUNE 2019
Transcript
Page 1: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY

TOWARDS MOBILE GOVERNMENTENSURING END-TO-END SECURITY AND PRIVACY OF IDENTITY CREDENTIALS FROM EGOV TO MGOV

ID4AFRICA – JOHANNESBURG

JULIEN VINTROU

JUNE 2019

Page 2: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 1

AGENDA

1. Short Introduction to NXP

2. Introduction to Mobile ID

3. Mobile ID Solution At a Glance

➢ Open Standards and Specs

➢ Typical Application Workflows

➢ Key Benefits

PUBLIC

Page 3: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 2

SHORT INTRODUCTION TO NXP

01.

PUBLIC |

Page 4: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 3

A Position of Strength to Better

Serve Our Customers

7TH largest semiconductor company2

Operations in 30+ countries

Headquarters:

Eindhoven, Netherlands

28,000+ employees

10,000 engineers

9,000 patent families

60+ year history

$9.4B annual revenue3

AutomotiveBroad-based

MCUs1

Secure

Identification

Communications

Processors

RF Power

Transistors#1 #1 #1 #1 #1

Sources: HIS, ABI Research, Strategy Analytics, The Linley Group1) MCU market excluding Automotive

2) Excludes memory3) Posted revenue for 2017

PUBLIC |

Page 5: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 4

INTRODUCTION TO MOBILE ID

02.

PUBLIC |

Page 6: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 5

The world is turning… MOBILE!

PUBLIC |

➢ Electronic ID (eID) and mobile ID (mID) are complementary,

➢ eID combined with mID brings new convenient usage with no

compromise on security.

Deployed:

• SWITZERLAND

• HUNGARY

• FRANCE

• KOSOVO

• UK

POC

• AUSTRALIA

• AUSTRIA

• GERMANY

• US

Page 7: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 6

NXP Vision of a Mobile Identity (mID) Solution

DIGITAL ID

VIS

ION

VA

LU

E

SHARED DIGITAL ID

NETWORKS

LINKING PEOPLE, DEVICES

SIMPLIFIED

ACCESS

PROVIDES

CHOICE

PROTECTS

PRIVACY

Provide a secure service

that conveniently connects

people to

critical online services

➢A mID Solution is in between a User and an on-line Service Provider

➢Key Features:

▪ Derive mobile identities from original root electronic documents and securely store them in mobile devices to offer the best compromise between convenience and security.

▪ Reliable & Secure back-end system offered to public and private service providers delivering online Identity, Authentication and Signature to citizens.

▪ Federation within decentralized identity system (no central database gathering citizens information)

PUBLIC |

Page 8: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 7

mID Solution - Packages

Package# Name Use-Case

P1

« Store »Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device (WhiteBox Cryptography, TEE, eSE, etc.).

P2

« Extract »eID MW

MW interfacing Original Root eDocument.

LOA Elevation when no eSE available.

Not required when no eID deployed.

P3

« Derive »mID MW

MW creating and operating the mID.

Authentication, delivery of cardholder personal details to RP...

KIOSK

USER DEVICE

INSPECTION TERMINAL

BACKEND

P2 - eID MW

P1 - Secure mID in

mobile device

P3 - mID MW

PUBLIC |

Page 9: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 8

End to End Security – from Chip to Service Providers through mobile

PUBLIC |

Tamper proof Chip HW

and cryptography

Mobile Security• SW based White Box

Crypto

• TEE

• eSE

Adaptive LOA of mobile

ID credential necessary due

to heterogeneous

Inspection of original eDocument

Attribute anchored

in mID on mobile device

WBC

➢ End to end encryption of

attributes from mobile

credential to Service

Provider.

➢ Attributes exchanged only

upon explicit user consent.

➢ Never stored in the

backend (neither plain nor

encrypted)

End to end security must be ensured

HW, SW, PIPE from physical document to

Service Provider through mobile

Page 10: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 9

NXP Key Pillars of Success

App

High Security

• State of the art: IntegralSecurity

architecture , Physical

Unclonable Function (PUF)

• Broadest range of security

certified composite solutions

(CC, EMVCo, FIPS, etc.)

• Common Criteria Certification:

➢ ICs: up to CC EAL6+

➢ JCOP: up to CC EAL6+

➢ Applets: up to CC EAL5+

• Zero-power Architecture

(Contactless)

• High Performance

(40nm technology)

Performance

eGov + Payment + Trsp

APPLICATIONS &

CONVERGENCE

SECURE

IC OS

SECURE ICS

E to M Solution

eDocument

WBC

TEE

eSE

Page 11: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 10

Secure Services 2GoO

EM

sC

red

en

tialP

rov

ide

rs

Wearables

Devices &

smart products

Connected Car

Smart Home

IoT

• Connect Credential Providers and OEMs

• Combine silicon level security with

easy-to-deploy services

• Reduce time-to-market and increase

scalability

Payment

Secure

Services 2GO

Platform

IoT

Identity

Transit, Access

Payment

Transit

Government

Enterprise &

Hospitality

PUBLIC |

Page 12: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 11

mID Solution At a Glance

03.

PUBLIC |

Page 13: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 12

Open standards and Specifications

PUBLIC |

Category Standards and Specifications

Web ID management Layer Open ID Connect based on OAuth2

BackendSpring Framework, Apache HTTP server, JBoss/Tomcat Apps Server, SAML/JSON/XML

Interfaces, JWT for tokens, Postgresql (Database) and Swagger UI

Level of Assurances (LOAs) NIST 800-63 (US) and eIDAS regulation (Europe).

Mngt of Original eIDISO 14443 (NFC), ICAO 9303 (ePass), ISO 18013 (eDL), IAS-ECCv2 (eID), NIST (PIV),

PKCS#11 and #15 (eServices),

DevOps Swagger UI, ElkStack (monitoring and logging engine)

PKI Infrastructure: OCSP and CRL protocols, EJBCA server.

Governments benefit full flexibility to:

- Adapt to local regulation

- Adapt to fit heterogeneous mobile environment

- Maximize interoperability and allow multi-sourcing

Page 14: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 13

Advanced Life Cycle Management of the credential

➢ NFC Smart Phone based enrollment

USERS

➢ Kiosk based enrollment

USERS

TRUSTED ID PROVIDER /

ISSUER➢ Issuance,

➢ Renewal,

➢ Unlock,

➢ Revocation,

➢ Etc.

PUBLIC |

Page 15: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 14

Access to Critical Online Services 24/7 - Unattended Use-Cases

Authentication

Login

Request

USERS

TRUSTED ID PROVIDER

/ ISSUER

SERVICE PROVIDER

LOA Elevation

➢ Identification

➢Signature➢Authentication

PUBLIC |

Page 16: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 15

Inspection of the Mobile Identities – Attended Use-Cases

USERS INSPECTORS

TRUSTED ID PROVIDER

/ ISSUER

PUBLIC |

Page 17: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 16

➢All-in-One mobile device trend

➢Federated identity allows one digital ID for all service providers

➢Allows access to critical online services 24/7

➢End-to-end security based on trusted original root electronic

document

➢Adaptive solution offering highest possible Level of Assurance (LOA)

on mobile devices

Key Benefits (1/2)

CONVENIENCE

SECURITY

PRIVACY

PUBLIC |

➢ Identity credentials should be stored on mobile devices, avoiding

storage of personal details and private keys in a central database

➢Users should actively decide which entity can access and use their

identity credentials

➢Data minimization (share minimum data, i.e. age instead of birth date)

Page 18: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 17

➢Support of all kind of mobile devices even without NFC-

enablement (thanks to the kiosk-based enrollment option)

➢Modular approach allowing integration into existing infrastructure

with custom middleware, security, and authentication schemes

through a plug-and-play scalable architecture

➢Solution owners benefit from cost reduction in system deployment

thanks to the flexibility

➢Service providers benefit from cost reduction by deferring identity

management and its associated liability, avoiding the burden of

infrastructure complexity

Key Benefits (2/2)

FLEXIBILITY

COST REDUCTION

PUBLIC |

Page 19: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 18 18

Page 20: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 19

Thank you for your attention!

Julien Vintrou

Marketing Manager Government

[email protected]

+49 1516 285 7979

PUBLIC |


Recommended