The introduction of online authentication as part of the new electronic national identity card in Germany
Graduate studies at Western
Identity in the Information Society 3 (1):87-110 (2010)
|Abstract||This chapter provides an analysis of the long process of introducing an electronic identity for online authentication in Germany. This process is described as a multi-facet innovation, involving actors from different policy fields shifting over time. The eID process started in the late ‘90s in the context of eGovernment and eCommerce with the legislation on e-signatures, which were supposed to allow for online authentication of citizens. When after 5 years it was recognized that this was not the case, a new digital ID card, which had meanwhile been announced, was chosen as token for the eID. This process was dominated by the concerns for visual inspection and border control, including the storage of digital fingerprints. Under the leadership of the Ministry of the Interior (BMI) and technical guidance of the Federal Agency for Information Security (BSI), technical specifications have to a large extent been adopted from the electronic passport, which had been smoothly introduced 2 years before. However, in the legislative process some concern regarding digital fingerprints on the eID card was raised and led to an opt-in solution. In 2009, a bill on the new ID card was passed which regulates the eID function for online authentication as well. This is characterized as a radical innovation by introducing a double-sided, mutual authentication of the citizen and the service provider and implementing the principle of proportionality regarding the access of service providers to data on the chip. At the time of writing, field tests are conducted. Roll-out of the new eID card is to start in November 2010. Therefore no figures about adoption can be provided here.|
|Keywords||ID card Double-sided authentication Electronic passport Privacy enhancing authentication RFID chip|
|Categories||categorize this paper)|
|Through your library||Configure|
Similar books and articles
Teemu Rissanen (2010). Electronic Identity in Finland: ID Cards Vs. Bank IDs. [REVIEW] Identity in the Information Society 3 (1):175-194.
Alexander Heichlinger & Patricia Gallego (2010). A New E-ID Card and Online Authentication in Spain. Identity in the Information Society 3 (1):43-64.
Tarvi Martens (2010). Electronic Identity Management in Estonia Between Market and State Governance. Identity in the Information Society 3 (1):213-233.
Herbert Kubicek & Torsten Noack (2010). The Path Dependency of National Electronic Identities. Identity in the Information Society 3 (1):111-153.
Georg Aichholzer & Stefan Strauß (2010). The Austrian Case: Multi-Card Concept and the Relationship Between Citizen ID and Social Security Cards. [REVIEW] Identity in the Information Society 3 (1):65-85.
Åke Grönlund (2010). Electronic Identity Management in Sweden: Governance of a Market Approach. [REVIEW] Identity in the Information Society 3 (1):195-211.
Ã…Ke GrÃ¶Nlund (2010). Electronic Identity Management in Sweden: Governance of a Market Approach. [REVIEW] Identity in the Information Society 3 (1):195-211.
Herbert Kubicek & Torsten Noack (2010). Different Countries-Different Paths Extended Comparison of the Introduction of eIDs in Eight European Countries. Identity in the Information Society 3 (1):235-245.
Jens Hoff & Frederik Hoff (2010). The Danish eID Case: Twenty Years of Delay. [REVIEW] Identity in the Information Society 3 (1):155-174.
Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous & Nathanael Cottin (2006). Meaningful Electronic Signatures Based on an Automatic Indexing Method. Artificial Intelligence and Law 14 (3):161-175.
Michael R. Nelson (2010). A Response to Responsibility of and Trust in ISPs by Raphael Cohen-Almagor. Knowledge, Technology and Policy 23 (3-4):403-407.
Herbert Kubicek (2010). Introduction: Conceptual Framework and Research Design for a Comparative Analysis of National eID Management Systems in Selected European Countries. [REVIEW] Identity in the Information Society 3 (1):5-26.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Giulio Galiero & Gabriele Giammatteo (2009). Trusting Third-Party Storage Providers for Holding Personal Information. A Context-Based Approach to Protect Identity-Related Data in Untrusted Domains. Identity in the Information Society 2 (2):99-114.
Emily Simpson & Karen Yu (2012). Closer to the Truth: Electronic Records of Academic Dishonesty in an Actual Classroom Setting. Ethics and Behavior 22 (5):400 - 408.
Added to index2010-12-05
Total downloads3 ( #213,863 of 739,360 )
Recent downloads (6 months)1 ( #61,680 of 739,360 )
How can I increase my downloads?