910/2014 - Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999/93/EC
Regulation (EU) No 910/2014 establishes a comprehensive legal framework for electronic identification and trust services to enhance secure electronic transactions across the EU internal market, thereby promoting digital single market integration. It replaces Directive 1999/93/EC, aiming to build trust in online interactions among citizens, businesses, and public authorities by ensuring mutual recognition of electronic identification means and specified assurance levels. The Regulation facilitates cross-border electronic service access through interoperability, security, and privacy guarantees, complying with data protection rules. It defines obligations for trust service providers, including liability, security practices, and supervisory oversight by designated national authorities. Qualified trust services are subject to stricter requirements, creating a high-security standard to foster user confidence, particularly for public and private online services. The Regulation also encourages private sector use of notified electronic identification schemes and mandates accessibility considerations for persons with disabilities. Overall, it seeks to remove barriers to digital service provision and supports legal validity and acceptance of electronic trust services EU-wide, reinforcing the digital economy and e-government development.
Purpose
Regulation (EU) No 910/2014, commonly known as eIDAS Regulation, aims to enhance trust in electronic transactions within the internal EU market by establishing a common framework for electronic identification and trust services. It seeks to facilitate secure electronic interactions between citizens, businesses, and public authorities across Member States, thereby fostering the development of public and private online services, e-business, and e-commerce. The regulation replaces Directive 1999/93/EC and addresses the absence of a comprehensive cross-border and cross-sector framework for electronic signatures and other trust services.
Key to this regulation is removing barriers to cross-border use of electronic identification and authentication, enabling mutual recognition of national electronic identification schemes (eIDs), and providing a legal framework to ensure security, interoperability, and trustworthiness of electronic transactions in Europe. It supports the creation of a digital single market by 2015 and beyond.
Key Obligations
Mutual recognition of electronic identification schemes: Member States must recognize and accept electronic identifications from other Member States that meet relevant assurance levels ('substantial' or 'high') for accessing public online services.
Notification of eID schemes: Member States may notify the European Commission of their electronic identification schemes for use in cross-border transactions. Once notified and published, mutual recognition applies.
Security and interoperability: Member States are required to cooperate to ensure security, interoperability, and technical compatibility of electronic identification schemes, avoiding undue technical or cost barriers to cross-border authentication.
Trust services legal framework: The regulation establishes common rules for trust services including electronic signatures, seals, time stamps, electronic delivery services, and website authentication. These services must meet security and liability requirements to be qualified trust services.
Supervisory bodies: Member States must designate supervisory bodies to oversee compliance with eIDAS rules for trust service providers and ensure accountability.
Liability: Trust service providers and the parties issuing electronic identification means assume liability for damages resulting from non-compliance.
Accessibility: Trust services and related end-user products should be made accessible to persons with disabilities, in line with the UN Convention on the Rights of Persons with Disabilities.
Data protection compliance: All activities under the Regulation must comply with EU data protection rules ensuring confidentiality, security, and adequate handling of personal data.
Qualified trust services: The Regulation promotes the use of qualified trust services with stringent security requirements, ensuring high confidence in electronic transactions.
Affected Products and Actors
Electronic identification means/schemes: National eID systems used by citizens and businesses to authenticate themselves online with public and private sector services.
Trust service providers: Entities offering trust services such as issuing qualified certificates for electronic signatures and seals, electronic time stamping, electronic registered delivery services, and website authentication certificates.
Public sector bodies: Authorities operating online services requiring electronic identification and authentication.
Private sector relying parties: Businesses and service providers relying on electronic identification and trust services for cross-border online transactions.
Supervisory bodies: National regulators designated to ensure the implementation and enforcement of the Regulation’s provisions.
End users: Citizens and businesses using electronic identification and trust services for secure access to online services and transactions.
Implementation Timeline
The regulation entered into force on 17 September 2014.
Its provisions became fully applicable on 1 July 2016, marking the start of mutual recognition of electronic identifications notified by Member States.
Member States were required to designate supervisory bodies and notify electronic identification schemes promptly to facilitate cross-border interoperability.
Ongoing cooperation and updates are expected to maintain interoperability, security standards, and promote innovation within the scope of electronic identification and trust services.
In summary, Regulation (EU) No 910/2014 (eIDAS) establishes a trusted, interoperable environment for electronic identification and trust services across the EU, removing obstacles to cross-border digital services and enhancing the digital single market with secure, user-friendly electronic transactions.
Regulation (EU) No 910/2014 applies to electronic identification and trust services used for electronic transactions within the internal market of the European Union. It covers electronic identification schemes and trust services that enable secure electronic interactions between citizens, businesses, and public authorities, facilitating cross-border access to online services, especially public services. The regulation targets electronic identification means offering assurance levels of substantial or high confidence, ensuring mutual recognition between Member States for services requiring electronic authentication. It regulates trust services provided to the public and having effects on third parties, while excluding those used exclusively within closed systems or internal procedures. The Regulation seeks to enhance interoperability, security, and legal certainty for electronic transactions across Member States, promoting digital single market goals without imposing obligations on private sector use or national electronic identity management systems.
Die Verordnung (EU) Nr. 910/2014 stärkt das Vertrauen in elektronische Transaktionen im Binnenmarkt durch die Schaffung eines einheitlichen rechtlichen Rahmens für elektronische Identifizierung und Vertrauensdienste. Sie regelt die gegenseitige Anerkennung elektronischer Identifizierungssysteme der Mitgliedstaaten, um die grenzüberschreitende Nutzung sicherer Online-Dienste zu erleichtern. Die Verordnung setzt verbindliche Sicherheitsniveaus für elektronische Identifizierungsmaßnahmen fest und fördert die Interoperabilität, wobei dem Datenschutz und der Datensicherheit hohe Priorität eingeräumt wird. Zudem etabliert sie Anforderungen an qualifizierte Vertrauensdiensteanbieter zur Gewährleistung eines hohen Sicherheitsstandards bei elektronischen Signaturen, Zeitstempeln und anderen Vertrauensdiensten. Ziel ist es, Hemmnisse für die digitale Wirtschaft zu beseitigen, die Sicherheit und Rechtssicherheit im Online-Geschäft zu erhöhen und damit den digitalen Binnenmarkt effizienter und zugänglicher zu machen-insbesondere auch für kleine und mittlere Unternehmen sowie Verbraucher. Die Verordnung ist technologieneutral und unterstützt Innovationen sowie die Inklusion von Menschen mit Behinderungen.
Zweck
Die Verordnung (EU) Nr. 910/2014 zielt darauf ab, das Vertrauen in elektronische Transaktionen innerhalb des Europäischen Binnenmarkts zu stärken. Sie schafft eine gemeinsame Grundlage für sichere elektronische Interaktionen zwischen Bürgern, Unternehmen und öffentlichen Verwaltungen. Dadurch soll die Effektivität von Online-Dienstleistungen, dem elektronischen Geschäftsverkehr und Handel in der Europäischen Union erhöht werden. Die Verordnung ersetzt die bisherige Richtlinie 1999/93/EG und erweitert deren Vorgaben, indem sie einen umfassenden gläsernen und sektorübergreifenden Rechtsrahmen für sichere und vertrauenswürdige elektronische Transaktionen etabliert.
Ein besonderes Augenmerk liegt auf der gegenseitigen Anerkennung elektronischer Identifizierungsmittel über Staatsgrenzen hinweg, um digitale Hindernisse im Binnenmarkt zu beheben und die Nutzung elektronischer Dienste, insbesondere von öffentlichen Verwaltungen, zu erleichtern. Die Verordnung verfolgt damit auch die politische Zielsetzung eines digitalen Binnenmarktes bis 2015, wie vom Europäischen Rat und Parlament gefordert.
Wichtige Verpflichtungen
Gegenseitige Anerkennung von elektronischen Identifizierungssystemen: Mitgliedstaaten sind verpflichtet, elektronische Identifizierungsmittel, die von anderen Mitgliedstaaten notifiziert und als mindestens gleichwertig eingestuft sind, für die Authentifizierung bei Online-Diensten anzuerkennen. Dieses Prinzip gilt insbesondere für öffentliche Dienste mit einem Sicherheitsniveau „substanziell“ oder „hoch“.
Standards für Vertrauensdienste: Die Verordnung legt einen allgemeinen Rechtsrahmen für Vertrauensdienste (z. B. elektronische Signaturen, elektronische Siegel, Zeitstempel) fest, einschließlich eines neuen Konzepts qualifizierter Vertrauensdienste und qualifizierter Vertrauensdiensteanbieter, die hohen Sicherheitsanforderungen genügen müssen.
Sicherheitsanforderungen: Die eingesetzten elektronischen Identitätssysteme und Vertrauensdienste müssen definierte Sicherheitsniveaus erfüllen: niedrig, substanziell oder hoch. Diese Anforderungen sind technologieneutral formuliert, um Innovationen nicht zu behindern.
Förderung der Interoperabilität: Mitgliedstaaten sollen zusammenarbeiten, um die technische Interoperabilität der elektronischen Identifizierungssysteme sicherzustellen und so grenzüberschreitende elektronische Transaktionen zu erleichtern.
Datenschutz und Vertraulichkeit: Die Verordnung sieht vor, dass bei der Verarbeitung personenbezogener Daten die Grundsätze des Datenschutzes gemäß der Richtlinie 95/46/EG eingehalten werden.
Haftungsregelungen: Die Verordnung regelt die Haftung von Mitgliedstaaten und Dienstanbietern bei der Nichteinhaltung der Vorschriften, ohne jedoch die nationalen Haftungsregeln zu ersetzen.
Betroffene Produkte und Akteure
Elektronische Identifizierungsmittel: Dazu zählen alle nationalen Systeme zur elektronischen Identifikation, die verwendet werden, um sich für Online-Dienste zu authentifizieren. Dies können beispielsweise elektronische Personalausweise oder spezifische digitale Identifikations-Apps sein.
Vertrauensdienste: Dienste, die elektronische Signaturen, Siegel, Zeitstempel, Registrierungen oder Zustellungen sowie Authentifizierungen von Webseiten bereitstellen.
Qualifizierte Vertrauensdiensteanbieter: Unternehmen oder Einrichtungen, die Vertrauensdienste mit erhöhten Sicherheitsstandards anbieten und deren Dienste von den Mitgliedstaaten nach den Vorgaben der Verordnung anerkannt werden.
Öffentliche Verwaltungen: Als Anbieter und Nutzer sicherer Online-Dienste, die sich auf eine gegenseitige Anerkennung der elektronischen Identifizierung stützen.
Unternehmen und Verbraucher: Nutzer von Online-Diensten, die von der verbesserten Sicherheit und europaweiten Anerkennung elektronischer Identitätsnachweise profitieren.
Umsetzungszeitplan
Die Verordnung ist am 23. Juli 2014 in Kraft getreten.
Die Mitgliedstaaten mussten ihre elektronischen Identifizierungssysteme der Europäischen Kommission innerhalb eines festgelegten Zeitraums notifizieren, um die gegenseitige Anerkennung zu ermöglichen. Diese Frist betrug in der Regel 12 Monate nach Inkrafttreten der Verordnung.
Die technischen und organisatorischen Anforderungen für Vertrauensdienste sowie die Rahmenbedingungen für qualifizierte Vertrauensdiensteanbieter sind mit Inkrafttreten anzuwenden.
Die Kommission veröffentlicht Listen der notifizierten elektronischen Identifizierungssysteme im Amtsblatt der Europäischen Union, die als Grundlage für die gegenseitige Anerkennung dienen.
Fortlaufende Zusammenarbeit und regelmäßige Aktualisierung von technischen Spezifikationen und Leitlinien werden erwartet, um den schnellen technologischen Fortschritt zu berücksichtigen und die Interoperabilität zu verbessern.
Diese Verordnung schafft somit den rechtlichen Rahmen für ein sicheres, interoperables europäisches Umfeld für elektronische Identifizierung und Vertrauensdienste, das den digitalen Binnenmarkt fördert und insbesondere grenzüberschreitende Online-Transaktionen erleichtert.
Die Verordnung (EU) Nr. 910/2014 regelt elektronische Identifizierung und Vertrauensdienste für elektronische Transaktionen im Binnenmarkt der EU. Sie gilt für öffentliche und private Online-Dienste, die eine sichere elektronische Interaktion zwischen Bürgern, Unternehmen und öffentlichen Verwaltungen erfordern, etwa für elektronische Signaturen, Authentifizierungsverfahren und elektronische Zustelldienste. Ziel ist die Gewährleistung der grenzüberschreitenden Anerkennung elektronischer Identifizierungsmittel sowie die Förderung eines sicheren und interoperablen digitalen Binnenmarkts unter Einbeziehung verschiedener Sektoren, darunter öffentliches Verwaltungshandeln, Gesundheitsdienste und elektronischer Handel. Vertrauensdienste, die von der Verordnung erfasst werden, sind insbesondere solche mit Wirkung nach außen gegenüber Dritten, während interne Systeme ohne Außenwirkung außerhalb des Anwendungsbereichs bleiben. Die Verordnung richtet sich an alle Mitgliedstaaten und betrifft sowohl öffentliche Stellen als auch Anbieter von Vertrauensdiensten.
Le règlement (UE) n° 910/2014 établit un cadre harmonisé pour l’identification électronique et les services de confiance dans les transactions électroniques au sein du marché intérieur européen. Il vise à renforcer la confiance des citoyens, entreprises et administrations dans les échanges en ligne, en assurant la sécurité, l’interopérabilité et la reconnaissance mutuelle des moyens d’identification électronique entre États membres. Ce règlement remplace la directive 1999/93/CE et fixe des exigences techniques et de sécurité tenant compte des différents niveaux de garantie d’identité. Il facilite l’accès aux services publics en ligne transfrontaliers, notamment dans des domaines tels que la santé, tout en respectant les principes de protection des données personnelles. Le règlement introduit également la notion de services de confiance qualifiés, assurant un niveau élevé de sécurité et de fiabilité des services liés aux signatures électroniques et à l’authentification. Les États membres doivent désigner des autorités de contrôle et encourager la participation du secteur privé. Cette réglementation promeut ainsi un marché numérique intégré, sécurisé et accessible à tous les citoyens de l’Union européenne.
Objet
Le règlement (UE) n° 910/2014, adopté le 23 juillet 2014, vise à renforcer la confiance dans les transactions électroniques au sein du marché intérieur de l’Union européenne en établissant un cadre commun d’identification électronique et de services de confiance. Ce cadre permet des interactions électroniques sécurisées et fiables entre citoyens, entreprises et autorités publiques, facilitant ainsi l’efficacité des services en ligne, le commerce électronique et l’activité économique dans l’UE. Il abroge la directive 1999/93/CE et répond à la nécessité d’interopérabilité, de sécurité et de reconnaissance mutuelle en matière d’identification électronique transfrontalière.
Obligations clés
- Reconnaissance mutuelle des moyens d’identification électronique : Les États membres doivent reconnaître les moyens d’identification électronique notifiés par d’autres États membres, sous réserve que ceux-ci respectent des niveaux de garantie minimum (faible, substantiel ou élevé) en fonction des exigences des services en ligne concernés.
- Notification et conditions des schémas d’identification électronique : Les États membres peuvent notifier à la Commission européenne leurs schémas d’identification électronique, qui doivent répondre à des critères de sécurité, d’interopérabilité et de fiabilité pour être reconnus.
- Services de confiance qualifiés : Le règlement établit un cadre commun pour les services de confiance, comme les signatures électroniques qualifiées, cachets électroniques, horodatages, services d’envoi recommandé électronique, et certificats pour l’authentification de sites web. Les prestataires doivent satisfaire à des exigences strictes pour garantir un niveau élevé de sécurité et de fiabilité.
- Interopérabilité et sécurité : Les États membres sont encouragés à coopérer pour assurer l’interopérabilité technique et la sécurité des services d’identification électronique et de confiance, favorisant l’adoption généralisée et transfrontalière.
- Accès égalitaire : Les services d’identification électronique et de confiance doivent être accessibles à tous, y compris les personnes handicapées, conformément aux normes européennes de non-discrimination.
- Responsabilités en cas de manquement : Le règlement prévoit des responsabilités partagées entre États membres, prestataires d’identification et d’authentification, en respect des dispositions nationales sur la responsabilité.
- Neutralité technologique et innovation : Les exigences définies sont indépendantes des technologies employées, favorisant ainsi l’innovation tout en assurant la sécurité et la confiance.
- Liberté des États membres : Les États membres conservent la liberté d’utiliser ou d’introduire des moyens d’identification électronique et peuvent décider d’associer le secteur privé ou non. Ils peuvent également établir des dispositions nationales complémentaires dans le respect du droit de l’Union.
Produits et acteurs concernés
- Produits : Moyens d’identification électronique (cartes d’identité électroniques, certificats, dispositifs d’authentification forte), services de confiance qualifiés (signatures électroniques, cachets, horodatages, services de remise recommandée électronique, certificats pour sites web).
- Acteurs : États membres de l’Union européenne, autorités publiques nationales, prestataires de services d’identification électronique, prestataires de services de confiance (qualifiés et non qualifiés), utilisateurs finaux (citoyens, entreprises, administrations), secteur privé souhaitant utiliser ces moyens pour accéder aux services en ligne transfrontaliers.
Calendrier de mise en œuvre
- Le règlement est entré en vigueur le 1er juillet 2016.
- Les États membres ont été invités à désigner des points de contact pour la notification de leurs schémas d’identification électronique.
- Les exigences de reconnaissance mutuelle s’appliquent immédiatement pour les services en ligne dont le niveau de garantie est substantiel ou élevé.
- La mise en œuvre progressive des services de confiance qualifiés a été planifiée pour permettre aux prestataires de se conformer aux nouvelles obligations.
- Un suivi continu de la coopération entre États membres est prévu pour garantir la sécurité, l’interopérabilité et l’évolution technique.
Cette réglementation constitue un cadre essentiel pour la construction d’un marché unique numérique sécurisé, facilitant les échanges électroniques transfrontaliers, la confiance des utilisateurs et le développement de services en ligne innovants au sein de l’Union européenne.
Le règlement (UE) n° 910/2014 s'applique aux interactions électroniques sécurisées entre citoyens, entreprises et autorités publiques au sein du marché intérieur européen. Il vise à fournir un cadre commun pour l'identification électronique et les services de confiance dans les transactions électroniques, notamment pour les services en ligne publics et privés, y compris l'accès aux services de santé transfrontaliers. Il concerne principalement les moyens d'identification électronique utilisés pour l'accès aux services en ligne, en exigeant leur reconnaissance mutuelle entre États membres lorsqu'ils répondent à des critères de sécurité spécifiques. Le règlement vise à renforcer la confiance dans les transactions électroniques, faciliter l'interopérabilité des systèmes d'identification électronique et promouvoir l'utilisation transfrontalière des services de confiance qualifiés, tout en respectant les législations nationales et en garantissant la protection des données personnelles. Les services de confiance concernés sont ceux fournis au public et ayant des effets sur des tiers.
Uredba (EU) št. 910/2014, znana tudi kot uredba eIDAS, vzpostavlja pravni okvir za elektronsko identifikacijo in storitve zaupanja za elektronske transakcije na notranjem trgu EU. Cilj je povečati zaupanje v digitalno okolje, olajšati čezmejno uporabo elektronske identifikacije in storitev zaupanja, ter zagotavljati varne, interoperabilne in tehnološko nevtralne rešitve. Uredba določa zahteve za priznavanje shem elektronske identifikacije med državami članicami, predvsem za javne storitve, ter ureja storitve zaupanja, kot so kvalificirani elektronski podpisi, pečati in časovni žigi. Poleg tega uvaja sisteme nadzora nad ponudniki teh storitev in njihovo odgovornost. S tem se spodbuja notranji trg, poenostavlja elektronsko poslovanje in krepi pravna varnost uporabnikov ter podjetij pri čezmejnih digitalnih interakcijah. Uredba tudi zagotavlja, da so storitve zaupanja dostopne invalidom in skladne z zahtevami varstva osebnih podatkov. Ta uredba nadomešča Direktivo 1999/93/ES in je ključna za vzpostavitev enotnega digitalnega trga v EU.
Namen
Uredba (EU) št. 910/2014 je bila sprejeta z namenom povečati zaupanje v elektronske transakcije na notranjem trgu Evropske unije. Z zagotavljanjem varnega in usklajenega okvira za elektronsko identifikacijo in storitve zaupanja namerava uredba omogočiti učinkovitejše javne in zasebne spletne storitve ter podpreti enotni digitalni trg. Namen je odpraviti pravne in tehnične ovire, ki državljanom, podjetjem in javnim organom otežujejo učinkovito uporabo čezmejnih elektronskih storitev.
Ključne obveznosti
Vzajemno priznavanje elektronske identifikacije: Države članice morajo priznati sredstva elektronske identifikacije, ki so bila priglašena Komisiji in ustrezajo minimalnim zahtevam, zlasti za dostop do spletnih javnih storitev z ustrezno stopnjo zanesljivosti (srednja ali visoka).
Tehnična interoperabilnost: Države članice morajo sodelovati za zagotovitev interoperabilnosti priglašenih shem elektronske identifikacije in olajšati zaupanje v te sheme.
Varstvo osebnih podatkov: Obdelava identifikacijskih podatkov mora biti ustrezna, relevantna in sorazmerna, skladna z Direktivo 95/46/ES (danes z GDPR).
Nadzor nad ponudniki storitev zaupanja: Države članice morajo imenovati nadzorne organe za izvajanje nadzora nad ponudniki storitev zaupanja, ki vključuje zagotavljanje varnosti, preglednosti in odgovornosti.
Oblikovanje kvalificiranih storitev zaupanja: Določene storitve zaupanja morajo biti kvalificirane s posebnimi zahtevami glede varnosti in varstva uporabnikov, da se zagotovi visoka raven zaupanja v te storitve.
Odgovornost ponudnikov storitev zaupanja: Ponudniki so odgovorni za škodo zaradi neizpolnjevanja obveznosti iz uredbe, vendar lahko določijo omejitve odgovornosti ob predhodnem obveščanju uporabnikov.
Dostopnost: Storitev zaupanja in izdelki morajo biti – kadar je tehnično in ekonomsko izvedljivo – dostopni invalidnim uporabnikom.
Vplivani proizvodi in akterji
Države članice EU: odgovorne za priglasitev nacionalnih shem elektronske identifikacije, imenovanje nadzornih organov in izvajanje nadzora.
Ponudniki sredstev elektronske identifikacije: morajo zagotoviti skladnost z zahtevami glede zanesljivosti in varnosti.
Ponudniki storitev zaupanja: npr. ponudniki elektronskih podpisov, časovnih žigov, certifikatov, ki zagotavljajo veljavne in varne storitve elektronskih transakcij.
Javni organi: morajo omogočiti uporabo priglašenih shem elektronske identifikacije za dostop do svojih spletnih storitev.
Podjetja in potrošniki: pridobijo možnost čezmejne uporabe elektronskih sredstev za varne spletne interakcije.
Zasebni sektor: spodbujeno je prostovoljno vključevanje v sheme priglašenih sredstev elektronske identifikacije za dostop do spletnih storitev.
Časovni okvir za izvedbo
Direktiva je začela veljati 1. julija 2016.
Države članice so morale uredbo implementirati v svojo nacionalno zakonodajo ter priglasiti sheme elektronske identifikacije v roku, določenem z uredbo.
Trajni proces vzajemnega priznanja sredstev elektronske identifikacije in nadzor nad storitvami zaupanja poteka glede na razvoj digitalnih tehnologij in potreb notranjega trga.
Rok za usklajevanje nadzora in zaupanje uporabnikov je kontinuiran, da se zagotovi učinkovito delovanje enotnega digitalnega trga EU.
Uredba (EU) št. 910/2014 se uporablja na področju elektronske identifikacije in storitev zaupanja za elektronske transakcije na notranjem trgu EU. Njen cilj je okrepiti zaupanje in varnost elektronskih interakcij med državljani, podjetji in javnimi organi, da bi omogočila čezmejno uporabo elektronske identifikacije, elektronskih podpisov, elektronskih dokumentov in elektronskih storitev dostave. Zajema zagotavljanje storitev zaupanja, kot so kvalificirani elektronski podpisi, pečati in časovni žigi, ki so ključni za pravno veljavne elektronske transakcije. Uredba se nanaša na javni in zasebni sektor ter zajema sektorje, ki izvajajo elektronske storitve, tudi tiste, ki so dostopne prek enotnih kontaktnih točk, kot so e-uprava, e-zdravje in digitalno poslovanje. Namenjena je tudi uporabi v številnih sektorjih, kjer je potrebna zanesljiva elektronska identifikacija in varne digitalne transakcije, ob upoštevanju varstva osebnih podatkov in nacionalnih zakonodaj.
General Information
This NWI Will be a TS and will specify additional requirements for qualified or not qualified trust services implementing electronic archiving service with specific regard to :
• Functional requirements to use for receipt, storage, retrieval and deletion to ensure that the electronic data and electronic documents (electronically-born documents and paper documents that have been scanned and digitized) are preserved in such a way that they are accessible and durably safeguarded against loss and unauthorized alteration or disposal, except for authorized changes concerning their electronic format.
• Procedures and technologies ensuring the accuracy of the origin, the durability and legibility, integrity of the electronic data and electronic documents beyond the technological validity period and at least throughout the legal or contractual preservation period, while maintaining their integrity and their origin.
• Procedures and technologies to use to allow authorised relying parties to receive a report in an automated manner that confirms that an electronic data and electronic documents retrieved from a qualified electronic archive enjoys the presumption of integrity of the data and electronic documents from the beginning of the preservation period to the moment of retrieval.
• Procedures and technologies to prevent unauthorized access and improper use of the confidential and restricted data and electronic documents.
• Interactions between electronic archiving trust services and other trust services.
• Procedures and technologies to reach and obtain a green sustainability approach when possible.
- Technical specification36 pagesEnglish languagee-Library read for1 day
This NWI Will be a TS and will specify additional requirements for qualified or not qualified trust services implementing electronic archiving service with specific regard to :
• Functional requirements to use for receipt, storage, retrieval and deletion to ensure that the electronic data and electronic documents (electronically-born documents and paper documents that have been scanned and digitized) are preserved in such a way that they are accessible and durably safeguarded against loss and unauthorized alteration or disposal, except for authorized changes concerning their electronic format.
• Procedures and technologies ensuring the accuracy of the origin, the durability and legibility, integrity of the electronic data and electronic documents beyond the technological validity period and at least throughout the legal or contractual preservation period, while maintaining their integrity and their origin.
• Procedures and technologies to use to allow authorised relying parties to receive a report in an automated manner that confirms that an electronic data and electronic documents retrieved from a qualified electronic archive enjoys the presumption of integrity of the data and electronic documents from the beginning of the preservation period to the moment of retrieval.
• Procedures and technologies to prevent unauthorized access and improper use of the confidential and restricted data and electronic documents.
• Interactions between electronic archiving trust services and other trust services.
• Procedures and technologies to reach and obtain a green sustainability approach when possible.
- Technical specification36 pagesEnglish languagee-Library read for1 day
This document identifies relevant existing standards and standards work in progress around European Digital Identity Wallets. It also identifies missing work items and overlaps in standards and is supposed to work as a roadmap for future standardization projects in the area.
- Technical report39 pagesEnglish languagee-Library read for1 day
This document identifies relevant existing standards and standards work in progress around European Digital Identity Wallets. It also identifies missing work items and overlaps in standards and is supposed to work as a roadmap for future standardization projects in the area.
- Technical report39 pagesEnglish languagee-Library read for1 day
This document specifies a protection profile for trustworthy systems supporting time stamping.
- Standard63 pagesEnglish languagee-Library read for1 day
This document specifies a protection profile for trustworthy systems supporting time stamping.
- Standard63 pagesEnglish languagee-Library read for1 day
The scope of proposed 419 241 part 2 (PP TSCM) covers security requirements to reach compliance with Annex II of Regulation No 910/2014 of the remote (qualified TSP operated) parts of the system, other than those relating to Signature Activation Data (SAD) management and the operation of the Signature Activation Protocol (SAP), assuming use of a cryptographic module conforming to EN 419 221-5. EN 419 241 part 2 will be balloted simultaneously with EN 419241 Part 3 Protection profile for Signature Activation Data management and Signature Activation Protocol(PP-SAD+SAP). These two new parts of EN 419 241, used in conjunction with the protection for PP for Cryptographic Module for Trust Services (EN 419 221-5), will contain security requirements for level 2 (sole control) as specified in TS 419 241 in a formal manner aligned with common criteria. These two new parts of EN 419 241, with EN 419 221-5, will support the certification of a system for remote qualified electronic signature or seal creation devices (remote QSCD) which meet the requirements of EU Regulation No 910/2014: The electronic signature creation data can be reliably protected by the legitimate signatory (sole control) against use by others, where the generation and management of the signature creation data is carried out by a qualified trust service provider on behalf of a signatory.
The scope of proposed 419 241 part 3 (PP-SAD+SAP) covers security requirements to reach compliance with Annex II of Regulation No 910/2014 on the management of the SAD and the operation of the SAP used to provide sole control of the signatory or seal creator for the remote QSCD signing or sealing functions. The proposed parts 2 and 3 are to be independent of specific authentication mechanism and signature activation protocol to allow maximum flexibility with respect to future solutions and to allow supporting several authentication mechanisms. The proposed part 3 is to take into account: a) potential implementations that require dedicated functional components, owned by the signatory or seal creator, which are for the purposes of ensuring sole control, and b) potential implementations that do not require such dedicated functional components but still ensuring sole control of the signatory or seal creator. The proposed part 3 covers requirements up to the interface to the signatory or seal creator needed for authentication and the interface to the signature creation application for selection, checking and display of data to be signed (e. g. a signature creation application as defined in EN 419 111) while requirements on the signature creation application itself are out of scope. It is proposed that part 3 (PP-SAD+SAP) forms the prime reference for server signing that may be certified according to Regulation No 910/2014 including Annex II, and that this part requires components certified according to part 2 (PP TSCM) and EN 419221-5.
- Standard75 pagesEnglish languagee-Library read for1 day
The scope of proposed 419 241 part 2 (PP TSCM) covers security requirements to reach compliance with Annex II of Regulation No 910/2014 of the remote (qualified TSP operated) parts of the system, other than those relating to Signature Activation Data (SAD) management and the operation of the Signature Activation Protocol (SAP), assuming use of a cryptographic module conforming to EN 419 221-5. EN 419 241 part 2 will be balloted simultaneously with EN 419241 Part 3 Protection profile for Signature Activation Data management and Signature Activation Protocol(PP-SAD+SAP). These two new parts of EN 419 241, used in conjunction with the protection for PP for Cryptographic Module for Trust Services (EN 419 221-5), will contain security requirements for level 2 (sole control) as specified in TS 419 241 in a formal manner aligned with common criteria. These two new parts of EN 419 241, with EN 419 221-5, will support the certification of a system for remote qualified electronic signature or seal creation devices (remote QSCD) which meet the requirements of EU Regulation No 910/2014: The electronic signature creation data can be reliably protected by the legitimate signatory (sole control) against use by others, where the generation and management of the signature creation data is carried out by a qualified trust service provider on behalf of a signatory.
The scope of proposed 419 241 part 3 (PP-SAD+SAP) covers security requirements to reach compliance with Annex II of Regulation No 910/2014 on the management of the SAD and the operation of the SAP used to provide sole control of the signatory or seal creator for the remote QSCD signing or sealing functions. The proposed parts 2 and 3 are to be independent of specific authentication mechanism and signature activation protocol to allow maximum flexibility with respect to future solutions and to allow supporting several authentication mechanisms. The proposed part 3 is to take into account: a) potential implementations that require dedicated functional components, owned by the signatory or seal creator, which are for the purposes of ensuring sole control, and b) potential implementations that do not require such dedicated functional components but still ensuring sole control of the signatory or seal creator. The proposed part 3 covers requirements up to the interface to the signatory or seal creator needed for authentication and the interface to the signature creation application for selection, checking and display of data to be signed (e. g. a signature creation application as defined in EN 419 111) while requirements on the signature creation application itself are out of scope. It is proposed that part 3 (PP-SAD+SAP) forms the prime reference for server signing that may be certified according to Regulation No 910/2014 including Annex II, and that this part requires components certified according to part 2 (PP TSCM) and EN 419221-5.
- Standard75 pagesEnglish languagee-Library read for1 day
1.1 General
This document specifies security requirements and recommendations for Trustworthy Systems Supporting Server Signing (TW4S) that generate digital signatures.
The TW4S is composed at least of one Server Signing Application (SSA) and one Signature Creation Device (SCDev) or one remote Signature Creation Device.
A remote SCDev is a SCDev extended with remote control provided by a Signature Activation Module (SAM) executed in a tamper protected environment. This module uses the Signature Activation Data (SAD), collected through a Signature Activation Protocol (SAP), in order to guarantee with a high level of confidence that the signing keys are used under sole control of the signer.
The SSA uses a SCDev or a remote SCDev in order to generate, maintain and use the signing keys under the sole control of their authorized signer. Signing key import from CAs is out of scope.
So when the SSA uses a remote SCDev, the authorized signer remotely controls the signing key with a high level of confidence.
A TW4S is intended to deliver to the signer or to some other application, a digital signature created based on the data to be signed.
This standard:
- provides commonly recognized functional models of TW4S;
- specifies overall requirements that apply across all of the services identified in the functional model;
- specifies security requirements for each of the services identified in the TW4S;
- specifies security requirements for sensitive system components which may be used by the TW4S.
This standard is technology and protocol neutral and focuses on security requirements.
1.2 Outside of the scope
The following aspects are considered outside of the scope of this document:
- other trusted services that may be used alongside this service such as certificate issuance, signature validation service, time-stamping service and information preservation service;
- any application or system outside of the TW4S (in particular the signature creation application including the creation of advanced signature formats);
- signing key and signing certificate import from CAs;
- the legal interpretation of the form of signature (e.g. electronic signature, electronic seal, qualified or otherwise).
1.3 Audience
This standard specifies security requirements that are intended to be followed by:
- providers of TW4S systems;
- Trust Service Providers (TSP) offering a signature creation service.
- Standard43 pagesEnglish languagee-Library read for1 day
This part of EN 419221 specifies a Protection Profile for cryptographic modules suitable for use by trust service providers supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation]. The Protection Profile also includes optional support for protected backup of keys.
The document follows the rules and conventions laid out in Common Criteria part 1 [CC1], Annex B "Specification of Protection Profiles".
- Standard79 pagesEnglish languagee-Library read for1 day
This part specifies mechanisms for SEs to be used as privacy-enabled devices in the context of IAS, and fulfil the requirements of Article 5 of the so-called eIDAS Regulation about data processing and protection.
It covers:
- Age verification
- Document validation
- Restricted identification
- eServices with trusted third party based on ERA protocol
- Standard22 pagesEnglish languagee-Library read for1 day
This part of this series contains Identification, Authentication and Digital Signature (IAS) services in addition to the QSCD mechanisms already described in Part 1 to enable interoperability and usage for IAS services on a national or European level.
It also specifies additional mechanisms like key decipherment, Client Server authentication, identity management and privacy related services.
- Standard58 pagesEnglish languagee-Library read for1 day
1.1 General
This document specifies security requirements and recommendations for Trustworthy Systems Supporting Server Signing (TW4S) that generate digital signatures.
The TW4S is composed at least of one Server Signing Application (SSA) and one Signature Creation Device (SCDev) or one remote Signature Creation Device.
A remote SCDev is a SCDev extended with remote control provided by a Signature Activation Module (SAM) executed in a tamper protected environment. This module uses the Signature Activation Data (SAD), collected through a Signature Activation Protocol (SAP), in order to guarantee with a high level of confidence that the signing keys are used under sole control of the signer.
The SSA uses a SCDev or a remote SCDev in order to generate, maintain and use the signing keys under the sole control of their authorized signer. Signing key import from CAs is out of scope.
So when the SSA uses a remote SCDev, the authorized signer remotely controls the signing key with a high level of confidence.
A TW4S is intended to deliver to the signer or to some other application, a digital signature created based on the data to be signed.
This standard:
- provides commonly recognized functional models of TW4S;
- specifies overall requirements that apply across all of the services identified in the functional model;
- specifies security requirements for each of the services identified in the TW4S;
- specifies security requirements for sensitive system components which may be used by the TW4S.
This standard is technology and protocol neutral and focuses on security requirements.
1.2 Outside of the scope
The following aspects are considered outside of the scope of this document:
- other trusted services that may be used alongside this service such as certificate issuance, signature validation service, time-stamping service and information preservation service;
- any application or system outside of the TW4S (in particular the signature creation application including the creation of advanced signature formats);
- signing key and signing certificate import from CAs;
- the legal interpretation of the form of signature (e.g. electronic signature, electronic seal, qualified or otherwise).
1.3 Audience
This standard specifies security requirements that are intended to be followed by:
- providers of TW4S systems;
- Trust Service Providers (TSP) offering a signature creation service.
- Standard43 pagesEnglish languagee-Library read for1 day
This Technical Report aims to be the entry point in relation to electronic signatures for any SME that is considering to dematerialize paper-based workflow(s) and seeks a sound legal and technical basis in order to integrate electronic signatures or electronic seals in this process. It is not intended to be a guide for SMEs active in the development of electronic signatures products and services - they should rather rely on the series ETSI EN 319 for building their offer - but it is a guide for SMEs CONSUMING e-Signature products and services.
This document builds on CEN/TR 419040, "Guidelines for citizens", explaining the concept and use of electronic signatures, to further help SMEs to understand the relevance of using e-Signatures within their business processes. It guides SMEs in discovering the level of electronic Signatures which is appropriate for their needs, extends the work to specific use-case scenarios, paying special attention to technologies and solutions, and addresses other typical concrete questions that SMEs need to answer before any making any decisions (such as the question of recognition of their e-Signature by third parties, within their sector, country or even internationally).
Once the decision is taken to deploy electronic signatures or electronic seals in support of their business, SMEs will then typically collaborate with their chosen providers of e electronic signatures or electronic seals products or services, which can be done on the basis of ETSI TR 119 100 "Guidance on the use of standards for signature creation and validation", that helps enterprises fulfil their business requirements. The present document presents the concepts and use of the standards relevant for SMEs developed under the Rationalised Framework to SMEs.
- Technical report30 pagesEnglish languagee-Library read for1 day
This Technical Report aims to help citizens to understand the relevance of using electronic signature within their day-to-day lives. It also explains the legal and the technical backgrounds of electronic signatures.
This document gives guidance on the use of electronic signatures and addresses typical practical questions the citizen may have on how to proceed to electronically sign, where to find the suitable applications and material.
- Technical report33 pagesEnglish languagee-Library read for1 day
This part specifies mechanisms for SEs to be used as privacy-enabled devices in the context of IAS, and fulfil the requirements of Article 5 of the so-called eIDAS Regulation about data processing and protection.
It covers:
- Age verification
- Document validation
- Restricted identification
- eServices with trusted third party based on ERA protocol
- Standard22 pagesEnglish languagee-Library read for1 day
This part specifies mechanisms for SEs to be used as qualified signature creation devices covering:
• Signature creation and mobile signature creation
• User verification
• Password based authentication
The specified mechanisms are suitable for other purposes like services in the context of EU Regulation 910/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC.
The particular case of seal is also covered by the specification. The differences between seal and signature are exposed in Annex B. Annex B also explains how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices.
Mobile signature is an alternative to the classical signature case which is performed by a secure element. Mobile signature is encouraged by the large widespread of mobile devices and the qualification authorized by the eIDAS Regulation. The particular case of remote signature (or server signing) is covered by this specification in Annex C.
In the rest of this document, except Annex B, there will be no particular notion of a seal since it technically compares to the signature.
- Standard115 pagesEnglish languagee-Library read for1 day
This part of EN 419221 specifies a Protection Profile for cryptographic modules suitable for use by trust service providers supporting electronic signature and electronic sealing operations, certificate issuance and revocation, time stamp operations, and authentication services, as identified by the (EU) No 910/2014 regulation of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (eIDAS) in [Regulation]. The Protection Profile also includes optional support for protected backup of keys.
The document follows the rules and conventions laid out in Common Criteria part 1 [CC1], Annex B "Specification of Protection Profiles".
- Standard79 pagesEnglish languagee-Library read for1 day
This part of this series contains Identification, Authentication and Digital Signature (IAS) services in addition to the QSCD mechanisms already described in Part 1 to enable interoperability and usage for IAS services on a national or European level.
It also specifies additional mechanisms like key decipherment, Client Server authentication, identity management and privacy related services.
- Standard58 pagesEnglish languagee-Library read for1 day
This Technical Report aims to help citizens to understand the relevance of using electronic signature within their day-to-day lives. It also explains the legal and the technical backgrounds of electronic signatures.
This document gives guidance on the use of electronic signatures and addresses typical practical questions the citizen may have on how to proceed to electronically sign, where to find the suitable applications and material.
- Technical report33 pagesEnglish languagee-Library read for1 day
This Technical Report aims to be the entry point in relation to electronic signatures for any SME that is considering to dematerialize paper-based workflow(s) and seeks a sound legal and technical basis in order to integrate electronic signatures or electronic seals in this process. It is not intended to be a guide for SMEs active in the development of electronic signatures products and services - they should rather rely on the series ETSI EN 319 for building their offer - but it is a guide for SMEs CONSUMING e-Signature products and services.
This document builds on CEN/TR 419040, "Guidelines for citizens", explaining the concept and use of electronic signatures, to further help SMEs to understand the relevance of using e-Signatures within their business processes. It guides SMEs in discovering the level of electronic Signatures which is appropriate for their needs, extends the work to specific use-case scenarios, paying special attention to technologies and solutions, and addresses other typical concrete questions that SMEs need to answer before any making any decisions (such as the question of recognition of their e-Signature by third parties, within their sector, country or even internationally).
Once the decision is taken to deploy electronic signatures or electronic seals in support of their business, SMEs will then typically collaborate with their chosen providers of e electronic signatures or electronic seals products or services, which can be done on the basis of ETSI TR 119 100 "Guidance on the use of standards for signature creation and validation", that helps enterprises fulfil their business requirements. The present document presents the concepts and use of the standards relevant for SMEs developed under the Rationalised Framework to SMEs.
- Technical report30 pagesEnglish languagee-Library read for1 day
This part is an informative introduction into the following parts. It gives guidance to the following parts in order to allow an efficient usage of the provided information. Therefore Part 1 provides history, application context, market perspective and a tutorial about the basic understanding of electronic signatures.
- Clause 3 provides "Terms and definitions" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.
- Clause 4 provides "Symbols and abbreviations" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.
- Clause 5 provides a Management Summary that describes the market context in which electronic signatures are typically
- Annex A provides the algorithm identifies for all parts of the standard.
- Annex B provides the algorithm identifies for all parts of the standard.
- Annex C provides the build scheme for object identifiers for all parts of the standard.
- Annex D "Tutorial on Signature Technology" provides a tutorial which helps the first reader to get familiar with signature technology and its relation to the society that it serves.
- Annex E "Guide to the EN 419212" explains the historical and technical evolution of the ESIGN activities which did finally lead to this version of the signature standard.
- Standard57 pagesEnglish languagee-Library read for1 day
This part specifies device authentication to be used for QSCDs in various context including
Device authentication protocols
Establishment of a secure channel Data structures
CV-certificates Key management
The device authentication protocols shall apply to sole-control signature mandated by the EU-regulation eIDAS.
- Standard117 pagesEnglish languagee-Library read for1 day
This part specifies mechanisms for SEs to be used as qualified signature creation devices covering:
• Signature creation and mobile signature creation
• User verification
• Password based authentication
The specified mechanisms are suitable for other purposes like services in the context of EU Regulation 910/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC.
The particular case of seal is also covered by the specification. The differences between seal and signature are exposed in Annex B. Annex B also explains how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices.
Mobile signature is an alternative to the classical signature case which is performed by a secure element. Mobile signature is encouraged by the large widespread of mobile devices and the qualification authorized by the eIDAS Regulation. The particular case of remote signature (or server signing) is covered by this specification in Annex C.
In the rest of this document, except Annex B, there will be no particular notion of a seal since it technically compares to the signature.
- Standard115 pagesEnglish languagee-Library read for1 day
This part specifies device authentication to be used for QSCDs in various context including
Device authentication protocols
Establishment of a secure channel Data structures
CV-certificates Key management
The device authentication protocols shall apply to sole-control signature mandated by the EU-regulation eIDAS.
- Standard117 pagesEnglish languagee-Library read for1 day
This part is an informative introduction into the following parts. It gives guidance to the following parts in order to allow an efficient usage of the provided information. Therefore Part 1 provides history, application context, market perspective and a tutorial about the basic understanding of electronic signatures.
- Clause 3 provides "Terms and definitions" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.
- Clause 4 provides "Symbols and abbreviations" covering all parts of this standards. The specific parts will contain a similar section which refers to the clause of this Part 1.
- Clause 5 provides a Management Summary that describes the market context in which electronic signatures are typically
- Annex A provides the algorithm identifies for all parts of the standard.
- Annex B provides the algorithm identifies for all parts of the standard.
- Annex C provides the build scheme for object identifiers for all parts of the standard.
- Annex D "Tutorial on Signature Technology" provides a tutorial which helps the first reader to get familiar with signature technology and its relation to the society that it serves.
- Annex E "Guide to the EN 419212" explains the historical and technical evolution of the ESIGN activities which did finally lead to this version of the signature standard.
- Standard57 pagesEnglish languagee-Library read for1 day
The present Technical Report provides guidance on the selection of standards and options for the signature/seal creation and other related devices (area 2) as identified in the framework for standardization of signatures: overview ETSI/TR 119 000 [16].
The present Technical Report describes the Business Scoping Parameters relevant to this area (see Clause 5) and how the relevant standards and options for this area can be identified given the Business Scoping Parameters (Clause 6).
The target audience of this document includes:
- business managers who potentially require support from electronic signatures/seals in their business and will find here an explanation of how electronic signatures/seals standards can be used to meet their business needs;
- application architects who will find here material that will guide them throughout the process of designing a system that fully and properly satisfies all the business and legal/regulatory requirements specific to electronic signatures/seals, and will gain a better understanding on how to select the appropriate standards to be implemented and/or used;
- developers of the systems who will find in this document an understanding of the reasons that lead the systems to be designed as they were, as well as a proper knowledge of the standards that exist in the field and that they need to know in detail for a proper development.
- Technical report33 pagesEnglish languagee-Library read for1 day
The regulation on electronic identification and trusted eServices (eIDAS regulation) clearly extends the current Electronic Signature Directive from electronic signature towards electronic identification and electronic authentication. These two topics are closely linked to electronic signature and are considered in this context in this document. There are many documents, standards, industrial initiatives and European projects on identification and authentication, but the scope here is limited to electronic signature context, and wider to electronic transactions in the internal market.
The present Technical Report is twofold.
It firstly does a brief analysis of the implementing acts on electronic identities CIR 2015/1501 [29] and CIR 2015/1502 [30] and how this is addressed by the eID interoperability framework [31]. It secondly establishes what areas of existing standards are impacted by the eID framework and what further areas of standardization could assist nations in providing eID services.
- Technical report15 pagesEnglish languagee-Library read for1 day
The present Technical Report provides guidance on the selection of standards and options for the signature/seal creation and other related devices (area 2) as identified in the framework for standardization of signatures: overview ETSI/TR 119 000 [16].
The present Technical Report describes the Business Scoping Parameters relevant to this area (see Clause 5) and how the relevant standards and options for this area can be identified given the Business Scoping Parameters (Clause 6).
The target audience of this document includes:
- business managers who potentially require support from electronic signatures/seals in their business and will find here an explanation of how electronic signatures/seals standards can be used to meet their business needs;
- application architects who will find here material that will guide them throughout the process of designing a system that fully and properly satisfies all the business and legal/regulatory requirements specific to electronic signatures/seals, and will gain a better understanding on how to select the appropriate standards to be implemented and/or used;
- developers of the systems who will find in this document an understanding of the reasons that lead the systems to be designed as they were, as well as a proper knowledge of the standards that exist in the field and that they need to know in detail for a proper development.
- Technical report33 pagesEnglish languagee-Library read for1 day
The regulation on electronic identification and trusted eServices (eIDAS regulation) clearly extends the current Electronic Signature Directive from electronic signature towards electronic identification and electronic authentication. These two topics are closely linked to electronic signature and are considered in this context in this document. There are many documents, standards, industrial initiatives and European projects on identification and authentication, but the scope here is limited to electronic signature context, and wider to electronic transactions in the internal market.
The present Technical Report is twofold.
It firstly does a brief analysis of the implementing acts on electronic identities CIR 2015/1501 [29] and CIR 2015/1502 [30] and how this is addressed by the eID interoperability framework [31]. It secondly establishes what areas of existing standards are impacted by the eID framework and what further areas of standardization could assist nations in providing eID services.
- Technical report15 pagesEnglish languagee-Library read for1 day
This Technical Specification specifies a protection profile for cryptographic modules used by certification service providers (as specified in Directive 1999/93) for signing operations, with key backup. Target applications include root certification authorities (certification authorities who issue certificates to other CAs and who are at the top of a CA hierarchy) and other certification service providers where there is a high risk of direct physical attacks against the module.
- Technical specification55 pagesEnglish languagee-Library read for1 day
This Technical Specification provides an overview of the protection profiles specified in other parts of CEN/TS 419221.
- Technical specification12 pagesEnglish languagee-Library read for1 day
This Technical Specification specifies a protection profile for cryptographic modules used by certification service providers (as specified in Directive 1999/93) for signing operations, without key backup. Target applications include root certification authorities (certification authorities which issue certificates to other CAs and is at the top of a CA hierarchy) and other certification service providers where there is a high risk of direct physical attacks against the module.
- Technical specification47 pagesEnglish languagee-Library read for1 day
This Technical Standard specifies a protection profile for cryptographic module for CSP key generation services.
- Technical specification41 pagesEnglish languagee-Library read for1 day
This Technical Standard specifies a protection profile for cryptographic module for CSP key generation services.
- Technical specification41 pagesEnglish languagee-Library read for1 day
This Technical Specification specifies a protection profile for cryptographic modules used by certification service providers (as specified in Directive 1999/93) for signing operations, without key backup. Target applications include root certification authorities (certification authorities which issue certificates to other CAs and is at the top of a CA hierarchy) and other certification service providers where there is a high risk of direct physical attacks against the module.
- Technical specification47 pagesEnglish languagee-Library read for1 day
This Technical Specification provides an overview of the protection profiles specified in other parts of CEN/TS 419221.
- Technical specification12 pagesEnglish languagee-Library read for1 day
This Technical Specification specifies a protection profile for cryptographic modules used by certification service providers (as specified in Directive 1999/93) for signing operations, with key backup. Target applications include root certification authorities (certification authorities who issue certificates to other CAs and who are at the top of a CA hierarchy) and other certification service providers where there is a high risk of direct physical attacks against the module.
- Technical specification55 pagesEnglish languagee-Library read for1 day
This European Standard:
- specifies terms used in specifying protection profiles for secure signature creation devices,
- specifies functional and operational requirements for secure signature creation devices,
- describes the targets of evaluation for these protection profiles.
- Standard21 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device that may import signing keys and communicate with the signature creation application in protected manner: secure signature creation device with key import and trusted communication with signature creation application (SSCD KI TCSCA).
- Standard24 pagesEnglish languagee-Library read for1 day
This European Standard:
- specifies terms used in specifying protection profiles for secure signature creation devices,
- specifies functional and operational requirements for secure signature creation devices,
- describes the targets of evaluation for these protection profiles.
- Standard21 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device that may import signing keys and communicate with the signature creation application in protected manner: secure signature creation device with key import and trusted communication with signature creation application (SSCD KI TCSCA).
- Standard24 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally and communicate with the signature creation application in protected manner: secure signature creation device with key generation and trusted communication with signature creation application (SSCD KG TCSCA).
- Standard24 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally and export the public key in protected manner: secure signature creation device with key generation and trusted communication with certificate generation application (SSCD KG TCCGA).
- Standard25 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device with signing keys import possibility: SSCD with key import (SSCD KI).
- Standard45 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally: secure signature creation device with key generation (SSCD KG).
- Standard42 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device with signing keys import possibility: SSCD with key import (SSCD KI).
- Standard45 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally and export the public key in protected manner: secure signature creation device with key generation and trusted communication with certificate generation application (SSCD KG TCCGA).
- Standard25 pagesEnglish languagee-Library read for1 day
This European Standard specifies a protection profile for a secure signature creation device that may generate signing keys internally and communicate with the signature creation application in protected manner: secure signature creation device with key generation and trusted communication with signature creation application (SSCD KG TCSCA).
- Standard24 pagesEnglish languagee-Library read for1 day
This European Standard is a Protection Profile that defines the security requirements for an authentication device.
- Standard71 pagesEnglish languagee-Library read for1 day
Frequently Asked Questions
An EU Regulation is a binding legislative act that must be applied in its entirety across the European Union. Unlike directives, regulations do not need to be transposed into national law and are directly applicable in all member states. Regulations are used when uniform application across all EU countries is essential.
Regulation 910/2014 covers "Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing directive 1999/93/EC". There are 58 standards associated with this regulation.
Harmonized standards under 910/2014 are European standards (ENs) developed by CEN, CENELEC, or ETSI in response to a mandate from the European Commission. When these standards are cited in the Official Journal of the European Union, products manufactured in conformity with them benefit from a presumption of conformity with the essential requirements of 910/2014, facilitating CE marking and free movement within the European Economic Area.