Top Banner
TOWARDS MOBILE GOVERNMENT ENSURING END-TO-END SECURITY AND PRIVACY OF IDENTITY CREDENTIALS FROM EGOV TO MGOV ID4AFRICA JOHANNESBURG JULIEN VINTROU JUNE 2019
20

TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

May 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY

TOWARDS MOBILE GOVERNMENTENSURING END-TO-END SECURITY AND PRIVACY OF IDENTITY CREDENTIALS FROM EGOV TO MGOV

ID4AFRICA – JOHANNESBURG

JULIEN VINTROU

JUNE 2019

Page 2: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 1

AGENDA

1. Short Introduction to NXP

2. Introduction to Mobile ID

3. Mobile ID Solution At a Glance

➢ Open Standards and Specs

➢ Typical Application Workflows

➢ Key Benefits

PUBLIC

Page 3: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 2

SHORT INTRODUCTION TO NXP

01.

PUBLIC |

Page 4: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 3

A Position of Strength to Better

Serve Our Customers

7TH largest semiconductor company2

Operations in 30+ countries

Headquarters:

Eindhoven, Netherlands

28,000+ employees

10,000 engineers

9,000 patent families

60+ year history

$9.4B annual revenue3

AutomotiveBroad-based

MCUs1

Secure

Identification

Communications

Processors

RF Power

Transistors#1 #1 #1 #1 #1

Sources: HIS, ABI Research, Strategy Analytics, The Linley Group1) MCU market excluding Automotive

2) Excludes memory3) Posted revenue for 2017

PUBLIC |

Page 5: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 4

INTRODUCTION TO MOBILE ID

02.

PUBLIC |

Page 6: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 5

The world is turning… MOBILE!

PUBLIC |

➢ Electronic ID (eID) and mobile ID (mID) are complementary,

➢ eID combined with mID brings new convenient usage with no

compromise on security.

Deployed:

• SWITZERLAND

• HUNGARY

• FRANCE

• KOSOVO

• UK

POC

• AUSTRALIA

• AUSTRIA

• GERMANY

• US

Page 7: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 6

NXP Vision of a Mobile Identity (mID) Solution

DIGITAL ID

VIS

ION

VA

LU

E

SHARED DIGITAL ID

NETWORKS

LINKING PEOPLE, DEVICES

SIMPLIFIED

ACCESS

PROVIDES

CHOICE

PROTECTS

PRIVACY

Provide a secure service

that conveniently connects

people to

critical online services

➢A mID Solution is in between a User and an on-line Service Provider

➢Key Features:

▪ Derive mobile identities from original root electronic documents and securely store them in mobile devices to offer the best compromise between convenience and security.

▪ Reliable & Secure back-end system offered to public and private service providers delivering online Identity, Authentication and Signature to citizens.

▪ Federation within decentralized identity system (no central database gathering citizens information)

PUBLIC |

Page 8: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 7

mID Solution - Packages

Package# Name Use-Case

P1

« Store »Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device (WhiteBox Cryptography, TEE, eSE, etc.).

P2

« Extract »eID MW

MW interfacing Original Root eDocument.

LOA Elevation when no eSE available.

Not required when no eID deployed.

P3

« Derive »mID MW

MW creating and operating the mID.

Authentication, delivery of cardholder personal details to RP...

KIOSK

USER DEVICE

INSPECTION TERMINAL

BACKEND

P2 - eID MW

P1 - Secure mID in

mobile device

P3 - mID MW

PUBLIC |

Page 9: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 8

End to End Security – from Chip to Service Providers through mobile

PUBLIC |

Tamper proof Chip HW

and cryptography

Mobile Security• SW based White Box

Crypto

• TEE

• eSE

Adaptive LOA of mobile

ID credential necessary due

to heterogeneous

Inspection of original eDocument

Attribute anchored

in mID on mobile device

WBC

➢ End to end encryption of

attributes from mobile

credential to Service

Provider.

➢ Attributes exchanged only

upon explicit user consent.

➢ Never stored in the

backend (neither plain nor

encrypted)

End to end security must be ensured

HW, SW, PIPE from physical document to

Service Provider through mobile

Page 10: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 9

NXP Key Pillars of Success

App

High Security

• State of the art: IntegralSecurity

architecture , Physical

Unclonable Function (PUF)

• Broadest range of security

certified composite solutions

(CC, EMVCo, FIPS, etc.)

• Common Criteria Certification:

➢ ICs: up to CC EAL6+

➢ JCOP: up to CC EAL6+

➢ Applets: up to CC EAL5+

• Zero-power Architecture

(Contactless)

• High Performance

(40nm technology)

Performance

eGov + Payment + Trsp

APPLICATIONS &

CONVERGENCE

SECURE

IC OS

SECURE ICS

E to M Solution

eDocument

WBC

TEE

eSE

Page 11: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 10

Secure Services 2GoO

EM

sC

red

en

tialP

rov

ide

rs

Wearables

Devices &

smart products

Connected Car

Smart Home

IoT

• Connect Credential Providers and OEMs

• Combine silicon level security with

easy-to-deploy services

• Reduce time-to-market and increase

scalability

Payment

Secure

Services 2GO

Platform

IoT

Identity

Transit, Access

Payment

Transit

Government

Enterprise &

Hospitality

PUBLIC |

Page 12: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 11

mID Solution At a Glance

03.

PUBLIC |

Page 13: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 12

Open standards and Specifications

PUBLIC |

Category Standards and Specifications

Web ID management Layer Open ID Connect based on OAuth2

BackendSpring Framework, Apache HTTP server, JBoss/Tomcat Apps Server, SAML/JSON/XML

Interfaces, JWT for tokens, Postgresql (Database) and Swagger UI

Level of Assurances (LOAs) NIST 800-63 (US) and eIDAS regulation (Europe).

Mngt of Original eIDISO 14443 (NFC), ICAO 9303 (ePass), ISO 18013 (eDL), IAS-ECCv2 (eID), NIST (PIV),

PKCS#11 and #15 (eServices),

DevOps Swagger UI, ElkStack (monitoring and logging engine)

PKI Infrastructure: OCSP and CRL protocols, EJBCA server.

Governments benefit full flexibility to:

- Adapt to local regulation

- Adapt to fit heterogeneous mobile environment

- Maximize interoperability and allow multi-sourcing

Page 14: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 13

Advanced Life Cycle Management of the credential

➢ NFC Smart Phone based enrollment

USERS

➢ Kiosk based enrollment

USERS

TRUSTED ID PROVIDER /

ISSUER➢ Issuance,

➢ Renewal,

➢ Unlock,

➢ Revocation,

➢ Etc.

PUBLIC |

Page 15: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 14

Access to Critical Online Services 24/7 - Unattended Use-Cases

Authentication

Login

Request

USERS

TRUSTED ID PROVIDER

/ ISSUER

SERVICE PROVIDER

LOA Elevation

➢ Identification

➢Signature➢Authentication

PUBLIC |

Page 16: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 15

Inspection of the Mobile Identities – Attended Use-Cases

USERS INSPECTORS

TRUSTED ID PROVIDER

/ ISSUER

PUBLIC |

Page 17: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 16

➢All-in-One mobile device trend

➢Federated identity allows one digital ID for all service providers

➢Allows access to critical online services 24/7

➢End-to-end security based on trusted original root electronic

document

➢Adaptive solution offering highest possible Level of Assurance (LOA)

on mobile devices

Key Benefits (1/2)

CONVENIENCE

SECURITY

PRIVACY

PUBLIC |

➢ Identity credentials should be stored on mobile devices, avoiding

storage of personal details and private keys in a central database

➢Users should actively decide which entity can access and use their

identity credentials

➢Data minimization (share minimum data, i.e. age instead of birth date)

Page 18: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 17

➢Support of all kind of mobile devices even without NFC-

enablement (thanks to the kiosk-based enrollment option)

➢Modular approach allowing integration into existing infrastructure

with custom middleware, security, and authentication schemes

through a plug-and-play scalable architecture

➢Solution owners benefit from cost reduction in system deployment

thanks to the flexibility

➢Service providers benefit from cost reduction by deferring identity

management and its associated liability, avoiding the burden of

infrastructure complexity

Key Benefits (2/2)

FLEXIBILITY

COST REDUCTION

PUBLIC |

Page 19: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 18 18

Page 20: TOWARDS MOBILE GOVERNMENT - ID4Africa · mID Solution - Packages Package# Name Use-Case P1 « Store » Secure mID in Mobile Device Adaptive secure storage of the mID in mobile device

INTERNAL/PROPRIETARY 19

Thank you for your attention!

Julien Vintrou

Marketing Manager Government

[email protected]

+49 1516 285 7979

PUBLIC |