Identification card systems - European Citizen Card - Part 4: Recommendations for European Citizen Card issuance, operation and use

CEN/TS 15480-4 recommends card issuance and operational procedures including citizens' registration.
CEN/TS 15480-4 gives recommendations with regard to the end-user e.g. with respect to privacy and accessibility aspects.
CEN/TS 15480-4 also identifies a set of standard ECC card profiles (e.g. National ID Card, Health Card, Card issued by a Municipality), that can be used as basis for the specification of new ECC projects.
For each profile, this Technical Specification uses a specified template which
-  selects a subset of technical requirements from CEN/TS 15480-1, FprCEN/TS 15480-2:2011 and CEN/TS 15480-3:2010.
-  considers the operation of the ECC in its particular environment.
The target audience of CEN/TS 15480-4 is the card issuer.

Identifikationskartensysteme - Europäische Bürgerkarte - Teil 4: Empfehlungen für Ausgabe, Arbeitsweise und Benutzung der Europäischen Bürgerkarte

Systèmes de cartes d’identification - Carte Européenne du Citoyen - Partie 4: Recommandations pour l’émission, l’exploitation et l’utilisation de la Carte Européenne du Citoyen

Sistemi z identifikacijskimi karticami - Kartica evropskih državljanov - 4. del: Priporočila za izdajanje, delovanje in uporabo kartic evropskih državljanov

CEN/TS 15480-4 priporoča postopke izdajanja in delovanja kartic, vključno z registracijo državljanov. CEN/TS 15480-4 vsebuje priporočila glede končnega uporabnika, npr. glede vidikov zasebnosti in dostopnosti. CEN/TS 15480-4 določa tudi niz profilov standardnih kartic evropskega državljana (ECC) (npr. nacionalni identifikacijski dokument, zdravstvena kartica, kartica, ki jo izda občina), ki se lahko uporabljajo kot podlaga za specifikacijo novih projektov kartice evropskega državljana. Za posamezni profil je v tehnični specifikaciji uporabljena določena predloga za izbiro podmnožice tehničnih zahtev iz CEN/TS 15480-1, CEN/TS 15480-2:2011 in CEN/TS 15480-3:2010, pri čemer se upošteva delovanje kartice evropskega državljana v specifičnem okolju. Ciljna publika CEN/TS 15480-4 so izdajatelji kartic.

General Information

Status
Published
Publication Date
11-Apr-2012
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
03-Apr-2012
Due Date
08-Jun-2012
Completion Date
12-Apr-2012
Technical specification
SIST-TS CEN/TS 15480-4:2012 - BARVE
English language
45 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


SLOVENSKI STANDARD
01-maj-2012
6LVWHPL]LGHQWLILNDFLMVNLPLNDUWLFDPL.DUWLFDHYURSVNLKGUåDYOMDQRYGHO
3ULSRURþLOD]DL]GDMDQMHGHORYDQMHLQXSRUDERNDUWLFHYURSVNLKGUåDYOMDQRY
Identification card systems - European Citizen Card - Part 4: Recommendations for
European Citizen Card issuance, operation and use
Identifikationskartensysteme - Europäische Bürgerkarte - Teil 4: Empfehlungen für
Ausgabe, Arbeitsweise und Benutzung der Europäischen Bürgerkarte
Systèmes de cartes d’identification - Carte Européenne du Citoyen - Partie 4:
Recommandations pour l’émission, l’exploitation et l’utilisation de la Carte Européenne
du Citoyen
Ta slovenski standard je istoveten z: CEN/TS 15480-4:2012
ICS:
35.240.15 Identifikacijske kartice in Identification cards and
sorodne naprave related devices
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

TECHNICAL SPECIFICATION
CEN/TS 15480-4
SPÉCIFICATION TECHNIQUE
TECHNISCHE SPEZIFIKATION
March 2012
ICS 35.240.15
English Version
Identification card systems - European Citizen Card - Part 4:
Recommendations for European Citizen Card issuance,
operation and use
Systèmes de cartes d'identification - Carte Européenne du Identifikationskartensysteme - Europäische Bürgerkarte -
Citoyen - Partie 4: Recommandations pour l'émission, Teil 4: Empfehlungen für Ausgabe, Arbeitsweise und
l'exploitation et l'utilisation de la Carte Européenne du Benutzung der Europäischen Bürgerkarte
Citoyen
This Technical Specification (CEN/TS) was approved by CEN on 23 January 2012 for provisional application.

The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN will be requested to submit their
comments, particularly on the question whether the CEN/TS can be converted into a European Standard.

CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS available
promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force (in parallel to the CEN/TS)
until the final decision about the possible conversion of the CEN/TS into an EN is reached.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland,
Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.

EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2012 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TS 15480-4:2012: E
worldwide for CEN national Members.

Contents Page
Foreword .5
1 Scope .6
2 Normative references .6
3 Abbreviations .6
4 General recommendations on card issuance and operational procedures .7
4.1 Initial considerations for an ECC project .7
4.2 ECC Management System and ECC lifecycle description .9
4.3 ECC Management System functional organization . 11
4.4 ECC Management System Architecture . 12
4.4.1 General principles. 12
4.4.2 ARIS: Application Registration and Issuance Subsystem . 13
4.4.3 IVAS: Identity Authentication and Verification Subsystem . 14
4.5 ECC Management System Security Policy . 14
4.5.1 Common principles . 14
4.5.2 Establishing Detailed Security Requirements for specific ECC profiles – Data Access . 15
4.5.3 Basic set of requirements for ECC Digital Signature. 16
5 Recommendations with regard to the end user . 17
5.1 Privacy principles for card issuance and operation . 17
5.1.1 General . 17
5.1.2 Protection of the data . 18
5.1.3 Transparency . 18
5.1.4 Consent in data collection . 18
5.1.5 Preference for opt-in . 18
5.1.6 Limitation of purpose . 18
5.1.7 Limitation of period of retention . 18
5.1.8 Adherence to performance criteria . 18
5.1.9 Access rights of the data subject . 18
5.1.10 Secure audit . 18
5.1.11 Data transfer between jurisdictions . 18
5.2 Accessibility . 19
5.3 Usability . 20
5.3.1 Introduction . 20
5.3.2 Usability and the physical environment . 20
5.3.3 Location . 20
5.3.4 Ease of use . 21
5.3.5 Help . 21
5.3.6 Further issues . 21
6 Privacy features of the ECC . 21
7 ECC security evaluation . 22
7.1 General . 22
7.2 Digital signature services . 22
7.3 Other services provided by an ECC. 23
7.3.1 General . 23
7.3.2 Security evaluation recommendations . 23
7.3.3 Security criteria for interoperability . 23
8 Card profiles for the ECC . 25
8.1 General . 25
8.2 User accessibility profile . 26
8.3 Card profile template . 26
8.3.1 General . 26
8.3.2 User accessibility profile . 26
8.3.3 Card durability requirements . 27
8.3.4 Card layout requirements . 27
8.3.5 Applications . 27
8.3.6 Selected card services . 27
8.3.7 Card Info . 27
8.3.8 Cross application services . 27
8.3.9 References . 28
8.4 Identification scheme for ECC profiles . 28
8.4.1 Card profile . 28
8.4.2 User accessibility profile . 28
Annex A (informative) Card profiles . 29
A.1 General . 29
A.2 Card Profile 1: eID Application with mandatory ICAO functionality and conditional digital
signature functionality . 29
A.2.1 OID . 29
A.2.2 General . 29
A.2.3 Applications . 29
A.2.4 Selected card services . 30
A.2.5 Card Info . 30
A.2.6 Cross application services . 31
A.2.7 References . 31
A.3 Card Profile 2: Dual-chip card with respective eID and ICAO Application . 32
A.3.1 OID . 32
A.3.2 General . 32
A.3.3 Applications . 32
A.3.4 Selected card services for ICAO application . 32
A.3.5 References . 33
A.4 Card Profile 3: eServices using a trusted Third Party . 34
A.4.1 OID . 34
A.4.2 General . 34
A.4.3 Applications . 34
A.4.4 Selected card services . 34
A.4.5 References . 34
A.5 Card Profile 4: Health Insurance Card . 35
A.5.1 OID . 35
A.5.2 General . 35
A.5.3 Applications . 35
A.5.4 Selected card services . 35
A.5.5 References . 35
A.6 Card Profile 5: Mono-application / Multi-service . 36
A.6.1 OID . 36
A.6.2 General . 36
A.6.3 Card durability requirements . 36
A.6.4 Applications . 36
A.6.5 Selected card services . 36
A.6.6 References . 39
Annex B (informative) User accessibility profile . 40
B.1 General . 40
B.2 User accessibility profile according to ISO/IEC 12905:2011 . 40
B.2.1 OID . 40
B.2.2 General . 40
B.2.3 Interfaces / transport protocols . 40
B.2.4 Data elements and data structures . 41
B.2.5 Card services . 42
B.2.6 Command set . 42
B.2.7 Data structure of Global UCI . 43
B.2.8 Data structure of Local UCI . 43
B.2.9 References . 43
Annex C (informative) Reference documents . 44
C.1 EU legal acts . 44
C.2 Security documents . 44
C.3 Technical standards (non-normative references) . 44
C.4 Other relevant documents . 45

Foreword
This document (CEN/TS 15480-4:2012) has been prepared by Technical Committee CEN/TC 224 “Personal
identification, electronic signature and cards and their related systems and operations”, the secretariat of
which is held by AFNOR.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
CEN/TS 15480 "Identification card systems — European Citizen Card" consists of the four following parts:
Part 1: Physical, electrical and transport protocol characteristics;
Part 2: Logical data structures and card services;
Part 3: European Citizen Card Interoperability using an application interface;
Part 4: Recommendations for European Citizen Card issuance, operation and use.
According to the CEN/CENELEC Internal Regulations, the national standards organizations of the following
countries are bound to announce this Technical Specification: Austria, Belgium, Bulgaria, Croatia, Cyprus,
Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia,
Spain, Sweden, Switzerland, Turkey and the United Kingdom.

1 Scope
CEN/TS 15480-4 recommends card issuance and operational procedures including citizens' registration.
CEN/TS 15480-4 gives recommendations with regard to the end-user e.g. with respect to privacy and
accessibility aspects.
CEN/TS 15480-4 also identifies a set of standard ECC card profiles (e.g. National ID Card, Health Card, Card
issued by a Municipality), that can be used as basis for the specification of new ECC projects.
For each profile, this Technical Specification uses a specified template which
 selects a subset of technical requirements from CEN/TS 15480-1, CEN/TS 15480-2:2011 and
CEN/TS 15480-3:2010.
 considers the operation of the ECC in its particular environment.
The target audience of CEN/TS 15480-4 is the card issuer.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
CEN/TS 15480-1, Identification card systems — European Citizen Card — Part 1: Physical, electrical and
transport protocol characteristics
CEN/TS 15480-2:2011, Identification card systems — European Citizen Card — Part 2: Logical data
structures and card services
CEN/TS 15480-3:2010, Identification card systems — European Citizen Card — Part 3: European Citizen
Card Interoperability using an application interface
ISO/IEC 12905:2011, Integrated circuit cards — Enhanced Terminal Accessibility using cardholder preference
interface
3 Abbreviations
For the purposes of this document, the following abbreviations apply.
ARIS Applicant Registration and Issuance System
ECC European Citizen Card
EMS ECC management system
ID card Identification Card
IVAS Identity Authentication and Verification System
MRTD Machine Readable Travelling Document
PKI Public Key Infrastructure
4 General recommendations on card issuance and operational procedures
4.1 Initial considerations for an ECC project
CEN/TS 15480-4 does not aim at providing an overall solution on how to design and run a complete EMS.
It provides some guidance to overcome common challenges that the organisations responsible for the
conception and management of the system are likely to face, including the following issues.
 Clear identification of the main purposes of the system and of the nature of the assets to be protected
shall lead to the early definition of the security policy to run the system
The ECC may be issued for different purposes: it can act for example as a national ID card, travelling
card, e-government or health insurance card. Following its intended purpose, the EMS main purpose can
diverge: to enhance security, to increase efficiency in the provision of services, to reduce identity fraud or
to cut expenses by establishing a system of privileges upon card and user's authentication. It is assumed
that privacy protection is a common objective. The use cases will define the applications to be selected by
the card. In this Technical Specification, use cases translate into ECC profiles (see Annex A), that
precisely describe card security mechanisms.
The practical work of the project can be summarized in the next four points:
 the analysis of risks based on the ECC use case;
 the definition of security policies to minimize the impact of those risks;
 the integration of those security policies within a modular architectural framework;
 the choice of technologies for implementation of the modules and of the communication interfaces
between the system components.
 A secure, trusted and cost-effective scheme should be carefully studied in order to make the appropriate
decisions for the inevitable trade-offs in terms of security / cost and security / privacy.
The ECC provisions have been specified having in mind the system integrator once the system objectives
have been set. For instance CEN/TS 15480-3:2010 provides guidance in relation with the key choices
relative to the physical and logical distributions of functionalities, the security architecture model and the
definition of interfaces for interoperability. The architectures proposed in this Technical Specification, are
aimed at avoiding unnecessary system complexity.
 An early decision is the sharing of the security functions between the components of the EMS and the
type of e-government services to be provided and their associated risks. Then there are two key issues:
 to identify the case for strong authentication requiring access to card services;
 to grant access or not to these services by cardholders external to the domestic system. Then to set
the access conditions.
Cross-Border access represents a case for strong authentication. The scheme can be able to trust a non-
domestic e-identity with a similar level of confidence to that of an e-identity issued by the system itself.
Transparent access to an e-government server, using the ECC as an authenticator, requires some
degree of harmonization between the infrastructures. This Technical Specification encourages
deployment of middleware-based access to services according to CEN/TS 15480-3:2010 provisions. This
architecture is intended to support the interoperability of electronic identity credentials.
Clearing and settlement infrastructures for cross-border e-government services are out of the scope of
this Technical Specification.
 Trust on e-identity requires confidence on the enrolment and issuance processes through, for instance,
the use of the same or similar practices.
A set of recommendations is provided in 4.4.2 ff. The EMS should be constructed of separate modules.
Each module performs its own function. The solution should be device/equipment independent so that
personalization equipments from several machinery suppliers may be considered.
One way to capitalize past investment is by the introduction of a module in the enrolment subsystem able
to authenticate and read an electronic document (as an electronic passport) in order to verify the
applicant’s identity at the beginning of the enrolment process
At present, limited harmonization exists at European level and significant differences remain between EU
Member States about privacy requirements. ID card issuance and operation is at present under national
laws that can differ substantially. Notice as well the lack of legal basis for the cross-border recognition of
electronic identities.
However, EU legislation might be relevant for the ECC which regards the following:
 data protection during the personal data capture, personalisation, issuance, and operational process,
including card renewal. Subclauses 5.1 ff. introduce this issue;
 the core identification, authentication and digital signature supported by the card that shall comply
with European Directive 1999/93/EC [2];
 the services provided by the card: The ECC is intended to facilitate access to cross-border shared e-
Government services as well as to simplify and strengthen the right of free movement and residence
of all EU citizens. In that respect, references to the European Directive 2006/123/EC [5] as well as to
the European Directive 2004/38/EC [4] are relevant.
Performing an EMS Private Impact Assessment can help to early identify potentially conflicting
procedures. In addition, to make a transparent communication campaign clearly explaining how personal
data will be collected and secured with both confidentiality and integrity can help overcome public
reluctance and gain social acceptance.
Privacy concerns for the enrolment and issuance process are described in 5.1 ff. ECC applicants should
be provided with full disclosure of the intended use of the ECC credentials and how the related privacy
implications are handled.
 Return on Investment is an issue and an early evaluation of cost is needed
Once the business case is set, cost estimates for public expenditure over a significant period of time
(5/10 years, e.g., lifetime of an ECC for ID) is needed. Whilst protection of some assets/fight against
fraud/national security may be a business case by itself, the ECC opens the way for collaboration
between the private sector and the public administrations. That way costs associated with the deployment
and maintenance of the EMS might be shared. That can be achieved by authorizing the use of the card
for daily life identification, enable the storage of other e-ID credentials or by using existing communication
infrastructures (e.g., authentication infrastructures) for e-government purposes.
This Technical Specification (Clause 7, Annex A) describes ECC card profiles that cover sound use cases
by recommending the use of state-of-the-art technology that will optimize card issuance costs.
 Consider social acceptance since the beginning: ECC management systems shall not discriminate
against citizens and specially those with special needs
It is recommended that the complete set of uses of the personal data stored in the card be disclosed.
Public debate on the pro’s and con’s of the proposed schemes and early consideration of expressed
public concerns specially for use of new technologies can be useful to gain social acceptance for EMS
and cards.
The accessibility to the services using the ECC should be guaranteed in terms of adapted rather than
standard use interfaces. The approach of the CEN/TS 15480 series is to store in the card itself those
information elements to be retrieved using standard procedures that enable the adaptation of the terminal
to the needs defined by the citizens themselves. This Technical Specification defines a specific user
accessibility profile according to ISO/IEC 12905:2011 as an application intended to describe the user
preferences for the Terminal User Interface.
 Testing is an important aspect to consider when fixing the system architecture
Past experience with MTRDs proves that sound testing specifications are a pre-condition for ECC
interoperability.
 Setting appropriate governance rules is key for EMS security
The objective of EMS governance is to create a set of end-to-end processes that define roles and
responsibilities, and create a practical system for decision-making based on audits and measurements
specially on the security performances of the system. In that case, governance may focus on security
monitoring and data collection and be a part of a more general security policy program.
Rules for governance and run of the system should be transparent to gain public confidence.
 Evaluate synergies with other machine readable travelling document projects
There are direct synergies between the systems deployed for issuance and verification of Machine
Readable Travelling Documents (MRTD) and ECCs. For many EU countries, it is expected that the
database for the ECC will be linked to the passport database to provide a single logical data source. In
addition, the current harmonization process for MRTD specifications, including security and testing
requirements, can also impact the ECC. Finally, when the ECC is issued as a travelling document, it
should be compatible with ICAO specifications according to EU regulations.
However, it should be underlined that MRTDs are not issued for access to services. Cross-border secure
access to e-government services raises issues specific to the ECC:
 the support of the electronic signature by the ECC,
 the access to card services through a standard middleware interface,
with a triplet of legal, technical and security implications, that have to be considered by ECC government
issuers.
Table 1 — Impact considerations
Legal impact Technical impact Security impact
Certification of ECC and
Need for PKI
Non-Repudiation Shift of
e-Sign application against
e-Signature
Liability if Compliance with
Card compliance with
a PP for Secure Signature
European Directive
CEN/TS 15480-2:2011
Creation Device
Access to Need for Cross-Border Need for Middleware Certification of ECC
e-Government recognition of electronic compliant with against a PP for
Services identities CEN/TS 15480-3:2010 Authentication

4.2 ECC Management System and ECC lifecycle description
The ECC issuer should implement a suitable ECC management system (EMS) supporting card lifecycle from
blank cards through to delivered cards and including all production errors and sample card issuance. The
systems should also handle lost and stolen, damaged and revoked cards.
The ECC lifecycle can be divided into seven stages as described below. Stages 1 to 5 are commonly
considered part of the Registration & Issuance Phase. Stage 6 corresponds to the operational life of the card,
including some possible maintenance operations. Stage 7 ends the ECC lifecycle.
 Stage 1: Initiation of Card Issuance
Depending on the ECC scheme, this stage can be started either on a voluntary basis by the citizen or by
a mandatory requirement of the administration.
 Stage 2: Citizen Identity Proofing
The public administration or a third organization under its responsibility (registration authority) identifies
the citizen based on the identity-evidence provided
 Stage 3: Identity Credential Issuance
Based on the authenticated ID attributes of the applicant, the authorized entity issues the e-ID credential,
which provides a user identifier to the system. For the ECC the e-ID credential is an electronic certificate
and the credentialing authority is a PKI certification authority (CA). The citizen becomes the only
legitimate owner of the ID credential during the period of validity of the electronic document.
 Stage 4: ECC Personalization
The Personalizing Authority stores securely the e-ID credential into the ECC. Along with the identity
credential, authenticators needed for the provision of IAS services are also personalized. They can
include one or more PIN codes, biometrics and private keys possibly both asymmetric and symmetric.
 Stage 5: ECC Delivery to the Subscriber
The ECC legitimate user may be subject to a specific authentication procedure by the card issuer before
delivery. The ECC standard assumes that not all the card mandatory functionalities may be available at
the time of the card delivery, meaning that they may be activated later on, during the operational life stage.
 Stage 6: ECC Operational Life
The ECC delivery means that the card enters the operational state of its life. The ECC enables the citizen
to access the services available. Dependent on the security policy implemented by the ECC issuer
authority different card maintenance processes can take place during the operational life of the card.
They include
 activation of card functionalities already present at the time of the ECC delivery,
 possible renewal of cryptographic information objects, keys and certificates,
 application downloading after card issuance.
 Stage 7: ECC termination and subsequent renewal
Scenarios other than the expiration date can lead to termination of the ECC: card stolen or lost, or
decision on certification revocation due to possible compromise or misuse. Renewal policies (new
issuance of certificates and cards for cardholders) and practices are not covered by this Technical
Specification.
Different EMS subsystems typically interact with the ECC at the different stages of the card operational
life. A possible modular implementation of the EMS is presented in 4.3.
4.3 ECC Management System functional organization
The implementation of processes described in 4.2 can be ensured through the deployment of an ECC
Management System (EMS) made up of three basic subsystems or primary components which are in turn
divided into modules.
The EMS defines rules to combine these modules and securely deliver services. In this subclause, these
services are the citizens' registration, including ECC issuance and the citizens' access to on-line services.
Furthermore, the technological solutions adopted to implement the modules should ideally be
device/equipment independent.
The EMS is made up of three primary subsystems:
1) the ECC card,
2) the Applicant Registration and Issuance System (ARIS) and
3) an Identity Authentication and Verification System (IVAS).
These first-level subsystems are in turn made up of primary functional components.
 The ECC, specified in ECC parts 1 and 2, can be issued selecting one of the application profiles as
per Annex A of this document and personalized with data structures enabling access to e-
government services using an infrastructure based on ECC part 3.
 The ARIS is made up of four different primary components:
 enrolment subsystem;
 card manufacturing and personalization subsystem;
 PKI subsystem;
 card issuance subsystem.
 The IVAS, whose core are Authentication Servers and which includes /or is interconnected with a
PKI is made up of
 an IT infrastructure for access to services using the ECC and a standard middleware, proposed
in CEN/TS 15480-3:2010,
 a Web Server infrastructure hosting Applications to grant e-Services accessible through the ECC,
the Web Browser and the middleware,
 a system to detect security/functional incidents and providing with a disaster recovery system.
The IVAS is briefly introduced in 4.4.3. The architecture of this functional model is based on
CEN/TS 15480-3:2010.
Some of these primary components may be shared following the architectural choices.
 PKI Infrastructure may be common to the ARIS and the IVAS.
 A register, database of ECC numbers issued and associated to cardholder personal information (e.g.,
name), which is fed by the ARIS and is accessed by the IVAS.
The specific organization, roles and responsibilities for the management and operation of the different
components of the EMS are out of the scope of this Technical Specification. However, it is usually under the
responsibility of the system integrator, to establish the coordination of the development tasks of the security
architecture of the EMS and their later integration in the system architecture along with the un-trusted logical
and physical components.
4.4 ECC Management System Architecture
4.4.1 General principles
The starting point is to design a system architecture for the management of the ECC including or interfacing
with an infrastructure provisioning e-government services to the citizens.
Access to services should be controlled, meaning that an identification system is needed. The identification
system guarantees, with a pre-established level of confidence, that both ends of the transaction are sure of
each other’s identity.
The citizen's identity is represented during the transaction by an electronic credential stored in the ECC. Once
this credential is authenticated, the cardholder is assigned with the citizen's identity represented by this
electronic credential and possibly granted the privileges associated to that identity.
The citizen trying to access an e-government service needs to trust the service and the ECC should provide
the mechanisms to provide such trust.
Mutual authentication is the process of establishing trust:
 in the electronic identity of a citizen that has been presented to the system. In the EMS, this process
involves the local and/or remote authentication of the citizen over a network in view to authorize access to
e-government services;
 in the identity of the application that the citizen is trying to access.
Once the access to the service has been authorized, application-specific data generated during the
transaction require protection. That is usually done by using a common key for both communicating parts
(ECC and IVAS). This key or set of keys are usually derived from a shared secret that was negotiated during
the Mutual Authentication process. Such processes are described in CEN/TS 15480-2:2011.
One specific case is when the application has to authenticate the fact that a message was sent by a particular
citizen associated with the private key using asymmetric cryptographic technology (electronic signature). In
that case, the integrity of the binding between a citizen’s public key and the citizen’s identifier (e.g. the name)
shall be trustworthy. This binding is represented by an electronic certificate issued by a certification authority.
A PKI system is implemented to provide the IVAS with the verification functionalities required to validate
certificates and electronic signatures.
The ECC needs to ensure that only the legitimate cardholder gets access to the ECC private key to generate
an electronic signature. Strong bindings between the ECC and the cardholder are then required. Biometrics
authentication technology can be considered in that case. The security of the whole system relies on the
security quality of the ECC and in particular the security of the processes leading to the card manufacturing,
the personalization in the card of cryptographic keys as well as other personal identifiers and the controls
performed during the initial registration of application and final delivery card procedures.
In this Technical Specification the processes leading to the issuance of the ECC to a citizen are executed by
the ARIS. ARIS is described in 4.4.2.
The main purpose of the ARIS is that the ECC is issued based on sound criteria upon verification of the
identity of the citizen requester. The security of the whole EMS relies first of all on the security policy applying
to the ARIS set of processes.
ARIS is managed under the responsibility of a public administration authority, which is in particular liable to
implement security mechanisms
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...