Is the person logging into the intranet actually authorized to do so? Is the software which issues a command to a computer authorized to do this? In the analogue world, we prove our identity with a passport and a driver's license. In the digital world, people or objects are clearly identified using a digital identity, which protects against misuse and makes work difficult for hackers.
However, on the web there is one commodity for which sellers are consistently achieving higher prices: digital identities and digital certificates. Machine identities are particularly popular on the Darknet. On marketplaces such as Dream Market, BlockBooth, and Galaxy3, SSL/TLS certificates cost up to several thousand US dollars. At the start of 2019, IT security researchers from Kaspersky Lab Material found more than 60,000 stolen existing digital identities on the Darknet shop Genesis.
If misuse of a digital identity is to be prevented, identity data must be securely generated, securely stored, and securely processed. But users are already complacent when choosing the right password. Four out of five data attacks take place due to simple and hackable character combinations. T-Systems offers various processes and solutions with which companies can generate digital identities, secure websites, and passwords.
In addition to issuing certificates, the full-service Trust Center also develops complex public key infrastructures (PKI) for industrial customers, authorities, countries, and organizations. The security and performance of individual solutions and products from the Trust Center are safeguarded through regular certifications. The team works in compliance with EU regulation on electronic identification and trust services (eIDAS), as well as the specifications of the European Telecommunications Standards Institute (ETSI). Furthermore, gematik approval for the electronic health card is available.
The Internet of Things (IoT) and machine-to-machine communication in connection with cloud and Industry 4.0 applications are only possible if millions of communicating things and machines are clearly virtually mapped through the automated mass issuance of digital identities.
The use of a two-factor authentication solution enables companies to optimally secure access to their data in line with their protection requirements.
The intelligent service generates one-time passwords to log into online services and protected systems, is easy to integrate, and offers increased security through strong two-factor authentication, as well as cost optimization through minimal bureaucracy. It enables users to access many systems and services with a single login process.
The cloud authentication solution facilitates strong two-factor authentication using one-time passwords.
Privileged account management allows companies to safeguard administrative access to their most critical IT resources (on-premises or in the cloud). PAM solutions help companies with the storage, management, and monitoring of privileged accounts and their credentials in a secure digital safe that fulfills compliance requirements (ISO 27001, BSI basic security...).
By creating a central secure storage space for privileged identity information, companies can:
Risk-based authorization and session management for privileged accounts to protect against attacks.
We carry it in our wallets and coat pockets, use it on our travels, or use it for checking into our office PC. But hardly anyone is aware that, by doing this, they are entrusting their personal data to one of the most secure operating systems on the IT market: the TeleSec Chipcard Operating System – or TCOS. The highly-secure smart card operating system is certified by the Federal Office for Information Security (BSI).
TCOS for passports or ID cards has been checked in accordance with the internationally recognized process of “Common Criteria”. It is therefore one of the most secure systems for international travel documents. More than 100 million passports, personal and company ID cards, digital tachographs, and electronic tickets in Europe are equipped with the highly secure TCOS operating system.
The PACE protocol protects against the unauthorized reading of data via a contactless interface. The chip on identity documents has a passport photo and fingerprints stored on it, among other things. The software organizes the encryption, the secure readout of personal data, and protects these against unauthorized access. TCOS is also able to safely store keys and calculate the cryptographic algorithm within the chip. Securely imported keys never have to leave the chip card again.
The combination of the TeleSec chip-card operating system and the security chip has been conceived with international requirements for electronic identity documents in mind. But we don't stop there: working with various chip manufacturers, we are continuously checking the use of new smart card technologies, as well as application areas. Examples of application areas are mobile security, company ID cards, electronic driving licenses (European driver's license), security for cloud solutions, and security for data in web solutions, such as intelligent electricity meters (smart meters).
Identity systems for electronic passports and national ID cards. Smartcard-based project solutions.
Secure storage and security anchors for the digital identities of people and devices.