Page 47 - Implementation of Secure Authentication Technologies for Digital Financial Services
P. 47

Notes on user’s identity:                          The authenticity of this data can be validated by
                                                               checking its digital signature on the blockchain.
            •  Before step  six  happens  where  the  FIDO  client   In  the  second  quarter  of  2018  Zug  planned  to
               requests the user certificate issuance, the user is   organise a consultation on a specific topic for exist-
               assumed to have finished user identification using   ing eID holders. Its primary goal was to collect ideas
               such a mechanism like mobile authentication,    for e-voting based on the new eID.
               accredited certificate, bank account authentica-
               tion, etc. Thus, the user identity is known at the   7.1.5   Example: FIDO Enrolment example
               sixth step.                                     FIDO specifications have made an explicit and
            •  The user uses FIDO authentication after the user   conscientious decision to separate “identity proof-
               has finished identification, while it is not tightly   ing” step  from  “enrolment”  step.  The  seperation
               coupled. The general scenarios are as follows;  allows for a more modular architecture whereby any
                                                               identity proofing technique can be combined with
                1)   A user performs user's identification defined   FIDO enrolment, including Alipay, Aadhaar eKYC,
                   by a service provider.                      existing PKI credentials (such as K-FIDO above) and
                2)   A  user  uses  FIDO  or  K-FIDO  service  (the   various NIST / FIPS LOAs.
                   scope of K-FIDO).                             A preferential architecture with FIDO is that
                                                               strong identity proofing is performed once, and then
            •  Authenticators decide where the user certificates   identity is bound to cryptographically and physically
               are stored. KISA recommends secure elements     secure credentials.
               such as keyStore, keyChain, USIM, or Trustzone,   A complete list of validation steps can be found in
               etc.                                            the WebAuthn specification [9]. Assuming that the
                                                               checks pan out, the server will store the new public
            7.1.4   Example: Zug eID – Ethereum Blockchain-    key associated with the user's account for future use
            based Digital ID                                   – that is, whenever the user desires to use the public
            Since November 2017 the Swiss City of Zug has been   key for authentication.
            offering  blockchain-based  digital  IDs  to  all  of  its
            30,000 citizens. [17]
               The Zug eID consists of three parts. First is the
            digital vault, which is part of the mobile app. This
            contains the  actual digital ID, which is encrypted;
            it can be unlocked by the owner biometrically or
            using a PIN code. Second is the  Ethereum block-
            chain where the app creates a unique cryptographic
            address for its holder. Third is the certification portal
            used by the officials who check that the applicant is
            a resident of Zug.
               After the applicant's name, address, date of birth,
            nationality, and passport number or ID card number
            have been verified, this data is digitally signed by the
            City of Zug, and the signature is stored as a certifi-
            cate in the citizen's digital vault. Since the City's pub-
            lic key is publicly available from the Ethereum block-
            chain, anyone who receives an eID from its holder
            can readily verify its authenticity.
               After a successful residency check, the City of Zug
            — itself a digital identity on the blockchain, albeit with
            special privileges — signs the identity contract of the
            user, for anyone to see and verify on the Internet. The
            owner of this special identity is the Zug city clerk.
               From that moment on, the owner of the eID can
            use the mobile app to provide identity information.





                                             Implementation of Secure Authentication Technologies for Digital Financial Services  45
   42   43   44   45   46   47   48   49   50   51   52