Use Case E-Government

Secure Identity Verification is the Basis of Modern E‑Government

A digitally working public administration is an important factor for the economic success of a region or a country: Efficiency, precision and speed in government processes are a key argument for companies when choosing a location. In addition, more and more citizens want to benefit from straightforward administrative processes. They have the feeling that the personal visit to the public office is no longer up to date.

E-Government: official procedures online

Public authorities should serve the citizen. To do so, it is necessary to evolve with time. Today, most companies and citizens take it for granted that the majority of their communication and financial transactions are carried out digitally and online. The desire to be able to use digital administrative services intuitively is all the stronger. E-government addresses this need.

Digital processes for public authorities

Through e-government, public authorities make an important contribution to smooth, reliable and efficient administration. OVD Kinegram ensures this with its products and solutions for security: Based on the secure identification of the citizen, we enable a modern, efficient and digital administration. With secure identities and valid data, we build trust in the digital world.

Secure identity verification for modern e-government

Our solutions enable the identification of natural persons to public authorities. Identities can be securely captured, verified and transferred to subsequent processes. This avoids interface problems and media discontinuities between different solutions, and staff do not need to be trained in the use of multiple systems.

Identification of natural persons is the basis for the provision of electronic identities. This applies to all e-government processes based on it, as well as to government controls, such as authentication at public authorities or when crossing borders. Secure, reliable and traceable identification is crucial in this context.

The sub-aspects important for trustworthy identity verification

1
2
3
4
Know you Customer with the Server based Chip verification solution of Kinegram Digital Solutions
1

Trusted ID Document

2

Reliable verification of ID documents

3

Verification of the authenticity and integrity of the data

4

Communication between the DocVal Server and the Chip is end-to-end encrypted

Server based chip verification enables fast & secure online identification

Our server-based chip verification is based on the online ID card function. This makes the service completely digital, significantly faster, and less expensive than conventional solutions.

ID card with activated eID function

1

Chip

2

MRZ – Machine Readable Zone

MRZ – machine readable zone

The machine readable zone (MRZ) is located on the back of the card in the lower part. It is built on International Civil Aviation Organization (ICAO) specifications. This ensures that the ID card can be read by a machine during checks, for example.

The NFC-enabled smartphone must register with the chip in order to read data from it. This requires this data from the passport:

  • Date of Birth (YYMMDD)
  • Expiration date (YYMMDD)
  • Document number (E.g. A51284970)

With our solution, this information is read directly from the MRZ, and transferred to the chip inspection.

Seamless identity verification using an identity card

The national ID card must have Radio Frequency Identification (RFID) chips and the eID function enabled. The smartphone requires Near Field Communication (NFC) interface as the mobile device acts as card reader and transmits data over encrypted channel to backend servers in your data center.

Identity Verification in 4 simple steps:

1.

The user scans the MRZ code

2.

The user holds the ID card next to the NFC-enabled smartphone

3.

The relevant data is verified with the user

The data is transmitted over a secure, encrypted channel. Background checks verify the validity of the ID card and whether it has been blocked.

4.

The verification process is completed

The citizen can now use the e-government services.

Stored data on the chip

The chip contains all data of the machine readable zone as well as all imprinted data except size, eye color and signature. Likewise, the photo of the ID card holder is also additionally stored in the chip in a higher resolution.

  • Surname
  • Birth name
  • First names
  • Doctorate degree
  • Date of birth
  • Place of birth
  • Photograph
  • Signature
  • Size
  • Color of eyes
  • Address, in case of address abroad the indication “no main residence in XYZ”.
  • Postal code
  • Nationality
  • Serial number

Protection of personal data

The data on the ID card is not stored centrally. Only the personal data and facial image will continue to be stored in the ID card registers of the ID card authorities, as was the case before the introduction of the ID card.

Digital security mechanisms ensure that the data on the ID card can only be read by authorized persons and systems. This also ensures that these authorized persons only have access to the data they need.

Biometrics in electronic ID documents

The use of biometrics in electronic ID documents serves to verify the ID card holder. This means that biometric features make it easier to determine whether the person presenting the ID card is actually the holder of the ID document. For example, two people who look almost the same to the human eye can be distinguished with the help of a computer-assisted facial comparison.

When this method is used, for example, at a border control, first the facial image is read from the identification document, then a picture is taken directly on site. These two images are then compared with a program. Slight changes in appearance, such as a different hairstyle, have no effect on the result of this check.

However, it is important that the biometric features stored in the ID document do not fall below a minimum level of quality. Various technical guidelines issued by the BSI, ISO and ICAO therefore provide uniform specifications on how the capture of the features must proceed and how the quality must be checked (e.g., TR 03121 – Biometrics in public sector applications). In this way, biometric procedures can be used in international border traffic.

Secure travel document

The ID card can be used as a passport replacement document for travel to certain countries. The chip increases the security of this travel document. The digitally stored facial image on the chip is of better quality than the printed image, as it is not distorted by the structure of the passport. With both the optionally stored fingerprints and the facial image, it is easier to determine whether the passport and the person really belong together. In addition, the security mechanisms on the NFC chip offer the possibility of quickly detecting a forgery of the ID card.

Server based chip verification allows a secure identity verification and is the basis of modern e-government

Secure

All communications are encrypted. We deliver software and SDK that you may use in your own apps, data centers and IT infrastructure.

Speedy

Verifying identity takes less than a minute and can be done conveniently at any time – there is no need for your customers to wait in line.

Versatile

Users have the choice of their preferred identification methods and full control over the release of personal data.

Conform

The product conforms to applicable laws and regulations.

OVD Kinegram is the global leader in protecting identities

120+ Countries

KINEGRAM technology has been chosen by more than 120 countries to protect their most important identity documents.

35+ Years of Innovation

For more than 35 years, OVD Kinegram has been the main innovation driver in security solutions for government documents.

Get more information about
secure identity verification

Contact

    First Name *

    Last Name *

    Company *

    Position

    E-Mail *

    Phone *

    Message *

    *

    I agree that my data from the contact form will be collected and processed to answer my request. You can find more information in our privacy policy.

    Contact
    Close