SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
The use of eID in various life situations
Bank
branch
Serving clients faster
and safer
Client identification using the eID
Automated data readout from
the eID chip
Opening an account
Internet banking
Registration in the Commercial Register
Registration and changes
in the List of Businesses
Thanks to the unique concept of
identity protection in the eID chip it
is now possible!
Registration of domicile
Registration of a vehicle
Application for an identity card
Access to personal electronic
health records
Booking an appointment with a doctor
Conclusion of an insurance policy
Reporting a claim
Shop safely and comfortably
Verification of client
trustworthiness
Secure services over
the Internet
Carrying out routine administrative
procedures electronically
Communicate with the insurance company
electronically and securely
Anonymously, securely,
reliably and online
Communication with doctors from
the comfort of your home
Trusted
and online
Secure
online shopping
Online
bank
Authorities
online
Company Elections, petitions,
surveys
Electronic
health care
Online
shop
eInsurance
Client identity data are retrieved from
a trusted source – from the eID chip
Verification of:
Authenticity of the chip and the data in the
eID chip
Validity of a document
eID status (issued, not lost or stolen)
Possession of the eID through entering a
personal security code associated with the
chip by its holder
Securing access to online bank services
High security, protection of personal data
and privacy in accordance with
the requirements of EU legislation
Verification of the authenticity and validity
of a document
Without a rollout of the eID media
and software for the user
Arrange everything with eID securely over
the Internet from the comfort of your home
Has anyone ever attempted to misuse your
identity card? With eID it is impossible!
It ensures the identification of the actual
owner of the document
Verifies the validity of the document
It is a safe and reliable means
of authentication
Fast and secure electronic services
of the insurance company for citizens
Data from the eID – secure and reliable
source of information on the insured
Personal information filled in automatically
instead of laborious manual form filling
Verification of the authenticity and validity
of a document and the identity of the holder
Fast and secure electronic services
for businesses
Data from the eID – secure and reliable
source of information
Personal information filled in automatically
instead of laborious manual form filling
Verification of the authenticity and validity
of a document and the identity of the holder
Elections, referenda, petitions, and surveys
quickly, conveniently and securely over the
Internet
Anonymity guaranteed
Uniqueness of vote guaranteed
– one person can cast only one vote
High security, protection of personal data
and privacy in accordance with
the requirements of EU legislation
Possibility of verifying one’s own vote while
preserving anonymity
Electronic health care safely
and conveniently over the Internet
Access secured through eID
High level of security, protection of personal
data and privacy in accordance with the
requirements of EU legislation
Encrypting sensitive data
Verification of the authenticity and validity
of a document
Increased mutual trust between the trader
and the customer
Verification of client identity
Preventing false purchase orders
Possibility of increasing the limit amount
for cash on delivery
High protection of personal data

Weitere ähnliche Inhalte

Was ist angesagt?

Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Werner Keil
 
E'banking and e'commerce b.v.raghunandan
E'banking and e'commerce b.v.raghunandanE'banking and e'commerce b.v.raghunandan
E'banking and e'commerce b.v.raghunandanSVS College
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber InsuranceClubHack
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsManzurul Hassan Zumman
 
How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...Linxens Group
 
E- Commerce and Internet Stock Trading
E- Commerce and Internet Stock TradingE- Commerce and Internet Stock Trading
E- Commerce and Internet Stock TradingRajaKrishnan M
 
How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?Stephany Gochuico
 
Information from the Credit Register for legal persons
Information from the Credit Register for legal personsInformation from the Credit Register for legal persons
Information from the Credit Register for legal personsLatvijas Banka
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentationxabi951
 
Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsFrancesco Bonadiman
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment systempankhadi
 
Global e payment system ppt
Global e payment system pptGlobal e payment system ppt
Global e payment system pptSalman Khaja
 

Was ist angesagt? (20)

GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
Micro Finance with Smart Card
Micro Finance with Smart CardMicro Finance with Smart Card
Micro Finance with Smart Card
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21
 
E'banking and e'commerce b.v.raghunandan
E'banking and e'commerce b.v.raghunandanE'banking and e'commerce b.v.raghunandan
E'banking and e'commerce b.v.raghunandan
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
 
How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...How will biometric payment overcome consumer fears over privacy and contactle...
How will biometric payment overcome consumer fears over privacy and contactle...
 
E- Commerce and Internet Stock Trading
E- Commerce and Internet Stock TradingE- Commerce and Internet Stock Trading
E- Commerce and Internet Stock Trading
 
How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?How will biometric payment overcome consumer fears over privacy and contactless?
How will biometric payment overcome consumer fears over privacy and contactless?
 
Information from the Credit Register for legal persons
Information from the Credit Register for legal personsInformation from the Credit Register for legal persons
Information from the Credit Register for legal persons
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 
Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric Systems
 
Electronic cheque
Electronic chequeElectronic cheque
Electronic cheque
 
Electronic payment
Electronic paymentElectronic payment
Electronic payment
 
10
1010
10
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Ch 2
Ch 2Ch 2
Ch 2
 
Global e payment system ppt
Global e payment system pptGlobal e payment system ppt
Global e payment system ppt
 

Andere mochten auch

Andere mochten auch (13)

Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Technology rethink for next generation loyalty programmes
Technology rethink for next generation loyalty programmesTechnology rethink for next generation loyalty programmes
Technology rethink for next generation loyalty programmes
 
Can customer experience thrive in the age of the io t
Can customer experience thrive in the age of the io tCan customer experience thrive in the age of the io t
Can customer experience thrive in the age of the io t
 
EFMA & HP: Evolution of the Workplace in Financial Services
EFMA & HP: Evolution of the Workplace in Financial ServicesEFMA & HP: Evolution of the Workplace in Financial Services
EFMA & HP: Evolution of the Workplace in Financial Services
 
To Accelerate IT Innovation, Think like a Rocket Scientist
To Accelerate IT Innovation, Think like a Rocket ScientistTo Accelerate IT Innovation, Think like a Rocket Scientist
To Accelerate IT Innovation, Think like a Rocket Scientist
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Forrester Survey Reveals Rising Customer Expectations & Improving Efficiency ...
Forrester Survey Reveals Rising Customer Expectations & Improving Efficiency ...Forrester Survey Reveals Rising Customer Expectations & Improving Efficiency ...
Forrester Survey Reveals Rising Customer Expectations & Improving Efficiency ...
 
Customer Experience in the Age of the Internet of Things
Customer Experience in the Age of the Internet of ThingsCustomer Experience in the Age of the Internet of Things
Customer Experience in the Age of the Internet of Things
 
Cape to Cape Challenge Reveals Potentials: Big Data Analytics for the Car of ...
Cape to Cape Challenge Reveals Potentials: Big Data Analytics for the Car of ...Cape to Cape Challenge Reveals Potentials: Big Data Analytics for the Car of ...
Cape to Cape Challenge Reveals Potentials: Big Data Analytics for the Car of ...
 
Game-Changers: CIOs on Digital Transformation
Game-Changers: CIOs on Digital TransformationGame-Changers: CIOs on Digital Transformation
Game-Changers: CIOs on Digital Transformation
 
Realize the Full Value
Realize the Full ValueRealize the Full Value
Realize the Full Value
 
Connecting the manufacturing industry
Connecting the manufacturing industryConnecting the manufacturing industry
Connecting the manufacturing industry
 

Ähnlich wie Hp pultik 1000x1000_out_en

Electronic Identity Verification: Key to Unlocking Business Success
Electronic Identity Verification:  Key to Unlocking Business SuccessElectronic Identity Verification:  Key to Unlocking Business Success
Electronic Identity Verification: Key to Unlocking Business SuccessFTx Identity
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshureTrustIDnow
 
The Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital EraThe Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital EraDrysign By Exela
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityEvernym
 
Online Identity Document Verification.pdf
Online Identity Document Verification.pdfOnline Identity Document Verification.pdf
Online Identity Document Verification.pdfDhanashreeBadhe
 
Authenticated Document/Data Exchange
Authenticated Document/Data ExchangeAuthenticated Document/Data Exchange
Authenticated Document/Data ExchangeNathaniel Palmer
 
Have Aadhar? Get eSignatures Too! – DrySign By Exela
Have Aadhar? Get eSignatures Too! – DrySign By ExelaHave Aadhar? Get eSignatures Too! – DrySign By Exela
Have Aadhar? Get eSignatures Too! – DrySign By ExelaDrysign By Exela
 
Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasShrikant Karwa
 
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Drysign By Exela
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accuratelyDavid Kelts, CIPT
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & SecurityMichael Bromby
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 

Ähnlich wie Hp pultik 1000x1000_out_en (20)

Electronic Identity Verification: Key to Unlocking Business Success
Electronic Identity Verification:  Key to Unlocking Business SuccessElectronic Identity Verification:  Key to Unlocking Business Success
Electronic Identity Verification: Key to Unlocking Business Success
 
Background verification services
Background verification servicesBackground verification services
Background verification services
 
J. Ishwarya (22URCOM12) .pptx
J. Ishwarya (22URCOM12) .pptxJ. Ishwarya (22URCOM12) .pptx
J. Ishwarya (22URCOM12) .pptx
 
J. Ishwarya (22URCOM12) .pptx
J. Ishwarya (22URCOM12) .pptxJ. Ishwarya (22URCOM12) .pptx
J. Ishwarya (22URCOM12) .pptx
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
The Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital EraThe Importance of Electronic Identities in the Digital Era
The Importance of Electronic Identities in the Digital Era
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
Online Identity Document Verification.pdf
Online Identity Document Verification.pdfOnline Identity Document Verification.pdf
Online Identity Document Verification.pdf
 
Authenticated Document/Data Exchange
Authenticated Document/Data ExchangeAuthenticated Document/Data Exchange
Authenticated Document/Data Exchange
 
Trustmedpartner
TrustmedpartnerTrustmedpartner
Trustmedpartner
 
Have Aadhar? Get eSignatures Too! – DrySign By Exela
Have Aadhar? Get eSignatures Too! – DrySign By ExelaHave Aadhar? Get eSignatures Too! – DrySign By Exela
Have Aadhar? Get eSignatures Too! – DrySign By Exela
 
Aadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideasAadhaar (Identity) Innovation ideas
Aadhaar (Identity) Innovation ideas
 
IDfy Booklet
IDfy BookletIDfy Booklet
IDfy Booklet
 
identity
identityidentity
identity
 
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
Empowering Digital Transactions eSignatures and eIDentification in India - Dr...
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accurately
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & Security
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Biometric
 Biometric Biometric
Biometric
 

Mehr von Hewlett Packard Enterprise Business Value Exchange

Mehr von Hewlett Packard Enterprise Business Value Exchange (20)

Manufacturing Forum 2016
Manufacturing Forum 2016Manufacturing Forum 2016
Manufacturing Forum 2016
 
Getting to your hybrid future
Getting to your hybrid futureGetting to your hybrid future
Getting to your hybrid future
 
Hewlett Packard Enterprise Connected Manufacturing Brochure
Hewlett Packard Enterprise Connected Manufacturing Brochure Hewlett Packard Enterprise Connected Manufacturing Brochure
Hewlett Packard Enterprise Connected Manufacturing Brochure
 
FSI Key Propositions
FSI Key PropositionsFSI Key Propositions
FSI Key Propositions
 
Happy Employees Lead to Happy Customers
Happy Employees Lead to Happy CustomersHappy Employees Lead to Happy Customers
Happy Employees Lead to Happy Customers
 
How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
Realising Potential - The Dandelion Program
Realising Potential - The Dandelion ProgramRealising Potential - The Dandelion Program
Realising Potential - The Dandelion Program
 
FinTech Innovation Model 2015
FinTech Innovation Model 2015FinTech Innovation Model 2015
FinTech Innovation Model 2015
 
Time for co-operation
Time for co-operationTime for co-operation
Time for co-operation
 
Awareness is only the first step
Awareness is only the first stepAwareness is only the first step
Awareness is only the first step
 
Time for co-operation
Time for co-operationTime for co-operation
Time for co-operation
 
Personalize the Travel Experience - and Gain Insights
Personalize the Travel Experience - and Gain Insights Personalize the Travel Experience - and Gain Insights
Personalize the Travel Experience - and Gain Insights
 
BVEx Research: Open Data Unlocked
BVEx Research: Open Data UnlockedBVEx Research: Open Data Unlocked
BVEx Research: Open Data Unlocked
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.
Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.
Vanilla. Vanilla. Vanilla. Strawberry. The New Imperative in Retail Banking.
 
HP Event Recap: Successful IT Governance
HP Event Recap: Successful IT GovernanceHP Event Recap: Successful IT Governance
HP Event Recap: Successful IT Governance
 
HP Event Recap: Transformation Time for Telcos
HP Event Recap: Transformation Time for TelcosHP Event Recap: Transformation Time for Telcos
HP Event Recap: Transformation Time for Telcos
 
Partner for Innovation and Growth!
Partner for Innovation and Growth!Partner for Innovation and Growth!
Partner for Innovation and Growth!
 

Hp pultik 1000x1000_out_en

  • 1. The use of eID in various life situations Bank branch Serving clients faster and safer Client identification using the eID Automated data readout from the eID chip Opening an account Internet banking Registration in the Commercial Register Registration and changes in the List of Businesses Thanks to the unique concept of identity protection in the eID chip it is now possible! Registration of domicile Registration of a vehicle Application for an identity card Access to personal electronic health records Booking an appointment with a doctor Conclusion of an insurance policy Reporting a claim Shop safely and comfortably Verification of client trustworthiness Secure services over the Internet Carrying out routine administrative procedures electronically Communicate with the insurance company electronically and securely Anonymously, securely, reliably and online Communication with doctors from the comfort of your home Trusted and online Secure online shopping Online bank Authorities online Company Elections, petitions, surveys Electronic health care Online shop eInsurance Client identity data are retrieved from a trusted source – from the eID chip Verification of: Authenticity of the chip and the data in the eID chip Validity of a document eID status (issued, not lost or stolen) Possession of the eID through entering a personal security code associated with the chip by its holder Securing access to online bank services High security, protection of personal data and privacy in accordance with the requirements of EU legislation Verification of the authenticity and validity of a document Without a rollout of the eID media and software for the user Arrange everything with eID securely over the Internet from the comfort of your home Has anyone ever attempted to misuse your identity card? With eID it is impossible! It ensures the identification of the actual owner of the document Verifies the validity of the document It is a safe and reliable means of authentication Fast and secure electronic services of the insurance company for citizens Data from the eID – secure and reliable source of information on the insured Personal information filled in automatically instead of laborious manual form filling Verification of the authenticity and validity of a document and the identity of the holder Fast and secure electronic services for businesses Data from the eID – secure and reliable source of information Personal information filled in automatically instead of laborious manual form filling Verification of the authenticity and validity of a document and the identity of the holder Elections, referenda, petitions, and surveys quickly, conveniently and securely over the Internet Anonymity guaranteed Uniqueness of vote guaranteed – one person can cast only one vote High security, protection of personal data and privacy in accordance with the requirements of EU legislation Possibility of verifying one’s own vote while preserving anonymity Electronic health care safely and conveniently over the Internet Access secured through eID High level of security, protection of personal data and privacy in accordance with the requirements of EU legislation Encrypting sensitive data Verification of the authenticity and validity of a document Increased mutual trust between the trader and the customer Verification of client identity Preventing false purchase orders Possibility of increasing the limit amount for cash on delivery High protection of personal data