Blog‎ > ‎

Studied: e-Estonia, e-resident concepts & technology

posted Oct 23, 2014, 8:10 AM by Sami Lehtinen   [ updated Oct 23, 2014, 8:10 AM ]
e-Estonia ID cards and digital authentication & signatures using smart cards.

Eesti: Gayway to eEstonia
Become Estonia's e-resident
e-Estonia ICT economy
Estonian ID card specifications
Detailed card & digital signature concept documentation
Application specification [PDF]

Compact list of related keywords & terms:
Digital signature concept, Certification Service Providers (CSP-s), Supervision – Registry and Ministry, Foreign Certificates, Identity Document Regulation, Mandatory document, Card appearance and layout, Certificates, E-mail address, Data protection, Organizational structure, card issuing and operation, Solutions, Certificate profiles and e-mail addresses, Certificate validity verification methods, OCSP, time-stamping and evidentiary value of digital signatures, Document format and DigiDoc, Roles, authorizations and organizations validations, New ideas: replacement and alternative cards, Chip and card application, Answer to reset, Card application, Identifying the card application, Card application file system structure, Objects in the card application, Card application principles, Card application objects, their details and general, operations, Personal data file PIN1, PIN2 and PUK code, Certificates, Certificates, Reading certificate files, Cardholder secret keys, Reading public key of cardholder secret key, Reading secret key information, Reading key references for active keys, Card application management keys: CMK_PIN, CMK_CERT & CMK_KEY, Deriving card application management keys, Miscellaneous information, Reading EstEID application version, Reading CPLC data, Reading data for available memory on chip, Card application general operations, Calculating the response for TLS challenge, Calculating the electronic signature, Calculating the electronic signature with providing pre-calculated hash, Calculating the electronic signature with internalhash calculating, Decrypting public key encrypted data, Card application managing operations, Secure channel communication, Mutual Authentication, Channel securing, PIN1, PIN2 and PUK replacement, Certificate replacement, New RSA key pair generation, Card application security structure, Card application constants, APDU protocol, Card possible response in case of protocol T0, Command APDU