Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D3.3: Study on Mobile Identity Management
AXS ID-Card
The AXS-Authentication Platform™ comprises technologies for the remote authentication of persons at Internet portals or at physical gates. The platform has an open and modular architecture that allows an implementation of the AXS-authentication in any web-based Extranet Access Management System (EAM) using standard Web technologies. The AXS authentication can also be implemented within any other Identity Management System (IMS) or existing authentication scheme. The platform includes tools and mechanisms (Müller, Jacomet and Cattin, 2002) that:
enable secure, mobile, ergonomic and privacy protecting authentication at physical gates or logical portals,,
enable the use of federated identities over multiple networks and operators (requirement VI and VII of section 2.1),
enable digital signature-codes on transaction documents proofing authenticity and integrity of an e-business transaction for both sides (requirement VIII of section 2.1),
enable the storage of key seeds and the use of pseudonyms for a secure and privacy guaranteed access to databases with sensible data (requirement III and IV of section 2.1) and
allow immediate and user-friendly roll-out, deployment and management of the identity credentials as no local HW or SW installation is needed, an Internet connection and a browser is sufficient (requirement Id, X of section 2.1)
How the
31 / 36 |