Home | MyGov

Accessibility
Accessibility Tools
Color Adjustment
Text Size
Navigation Adjustment
Screen Reader iconScreen Reader

Using Mobile Phones as Instruments for Digital Identity

Using Mobile Phones as Instruments for Digital Identity
Start Date :
Sep 09, 2014
Last Date :
Sep 25, 2014
18:30 PM IST (GMT +5.30 Hrs)
Submission Closed

Providing a digital identity to all individuals is crucial to facilitate electronic authentication for delivery of online public services. The digital identity must be unique, ...

Providing a digital identity to all individuals is crucial to facilitate electronic authentication for delivery of online public services. The digital identity must be unique, lifelong, online and authenticable. The digital identity should be easily verifiable in an online and cost-effective way. Aadhaar provides such a digital identity that also serves as a proof of identity and address for individuals. If such a digital identity could be linked to mobile phones in a secure manner, it would make the task of online authentication much easier at the level of the individual. As the penetration of mobile phones is high, this digital identity will facilitate the delivery of online services more easily.

\

Ideas and suggestions are welcome on how mobile phones and digital identity could be linked so that mobile phones can be used as instruments for online electronic authentication of individuals’ identities. The suggestions may include technical architecture and solutions, policy guidelines, process improvements, implementation mechanisms, cost effectiveness, operational efficiency, etc. You can upload your ideas in doc or pdf format.

SUBMISSIONS UNDER THIS TASK
344
Total
266
Approved
78
Under Review
Reset
Showing 266 Submission(s)
Charu Kirti Jain
Charu Kirti Jain 11 years 2 months ago
The details of a Singaporean implementation are available at http://www.ezlinknfc.com/about/ The key concerns in Indian context would be - No. of incidents of theft/ phone-snatching/ loss of phone (telecom operators can provide exact counts of new sim cards issued owing to the above) - Support structure and response time to disable sim and phone, if one's phone is lost (current day pain point is to get a fir/ ddr registered with police, hope these can be electronically registered as well)
sonu singla
sonu singla 11 years 2 months ago
Sir it is possible we just need to create a mobile application which is directly connected with aadhar card main site and login id should be login only when finger print will match with the aadhar card finger print and if any unauthorised person login then a alaram in the cyber crime control office will bug and current mobile location will track and strike action will take if any unauthorized person try to login. Or mobile theft by anyone this will also identified from this application.
sonu singla
sonu singla 11 years 2 months ago
I think we should first of all solve problems related to networking and cyber security. Network disconnect tine to time and charges of internet his too high. Everyone can't affort it so we first solve these then government should provide one mobile application through which all payments electricity, telephone, water, muncipal tax, all taxes etc. Pay by single login and payment system should easy so that not educated people also operate this application effectively and easily.
Narendra Tripathi
Narendra Tripathi 11 years 2 months ago
Mobile phones as instruments for digital identity is a good idea. Sir it would be great if an application is made , so that all the information like voter id , driving licence , rashan card , aadhar card , DBT all should be in that application , it would be helpful for bank too . Also this application should be safe , so that private information given on it , should not be leaked.
Amit Singh
Amit Singh 11 years 2 months ago
questions regarding the data uploaded to the government's server referred by the IMEI number provided, now if nothing's wrong, answers will be correct, else the culprit will be caught. Besides, if the cell is lost, aadhar card will always be there as a backup.
Amit Singh
Amit Singh 11 years 2 months ago
IMEI number is enough for utilization of cell phones as digital identity. My idea is that every time sum1 buys a phone, the seller should submit his documents along with the IMEI number to the concerned company, the company in turn will upload all the user's data along with IMEI number as its reference to a server controlled by government. Now if sum1 tries to buy a sim, he must provide the IMEI number, only, of the cell in which he's gonna insert it, then he will be asked a few [contd.]
Sai Sravani Boorugula
Sai Sravani Boorugula 11 years 2 months ago
“MOBILE DEVICES ARE A CRITICAL ELEMENT IN MOST PEOPLE’S LIVES”. Hence , besides providing its access to a variety of end-users its security must also be taken into consideration.The above techniques will effectively ensure the user to communicate happily with the other side if properly implemented.
Sai Sravani Boorugula
Sai Sravani Boorugula 11 years 2 months ago
3.) Using an Identity Credential Stored in the Mobile Phone’s Secure Element A company-issued credential can also be stored in the SE of a phone. Storage of the credential in the SE requires the company to work with the SE owner (for example, the phone manufacturer or mobile network operator) to pay for memory space on the SE and provision the credential to the chip. In addition, the phone is associated with the employee ID.
Sai Sravani Boorugula
Sai Sravani Boorugula 11 years 2 months ago
The second suggestion that I am giving is: 2.) Leveraging NFC and the Employee ID Badge: The emergence in the market of NFC-enabled mobile devices creates opportunities to further improve security and authentication for remote applications. An employee with an NFC-enabled phone may be able to tap a contactless smart ID credential against the phone and use the information on the card to confirm the employee’s identity.
Sai Sravani Boorugula
Sai Sravani Boorugula 11 years 2 months ago
Some of my suggestions are : 1.) Using the Phone as an Out-of-Band Authentication Device: Using the phone as an out-of-band authentication device requires that an employee’s mobile phone be provisioned with an application that, when requested, either produces a one-time password (OTP) or prompts the person for confirmation. In addition, the phone must be correlated with the person’s identity. Once a preregistered user ID–password combination is entered, the authentication is done.