Security Technologies of the eID Function
Article
The security technologies protect your data on the chip.
The technologies protecting your personal data on the ID card's chip against unauthorized access meet the highest security standards.
- The protocols and mechanisms used have warded off all attacks successfully. They are internationally recognized and established.
- All data are transmitted in encrypted form from the ID card to the service provider (end-to-end encryption).
- The components used are developed and checked in line with the requirements of the Technical Guidelines of the Federal Office for Information Security (BSI).
Requirements for sending data from the chip
To protect your data, data can be sent only if specific requirements are met:
- In contrast to simple radio chips used for example in key cards or ski passes data stored on the ID card can be retrieved only with a valid authorization certificate. Therefore, unauthorized access is not possible.
- Every time before data are transmitted the ID card checks whether an authorization certificate is available and whether data may be sent to the requesting party. It also checks whether the ID Card itself is valid. Once your ID-Card has expired the eID Function cannot be used anymore.
- Furthermore, your personal data are transmitted only after you have entered your six-digit PIN.
- All information and transmissions are protected through recognized and established international technical procedures (encryption and signature).