​A secure digital mobile lifestyle: from e-ID towards Mobile ID


Mobile Identity Ecosystem

A number of pioneering countries are already tackling the challenge of Mobile Identities (m-ID). For some, the answer lies in operator level approaches. For others, it is rooted in the existing physical and digital identities​ created by government. Whatever the approach, the most successful m-ID services already launched are highly dependent on colla​boration between public authorities, banks, telecom operators and the private sector. The first key success factor is the role of government in creating a trusted framework. The second is to provide user protection when utilizing online services. 

​​​Different kinds of Mobile ID solution can be implemented, such as using the phone as a reader (reading credentials are stored on the Secure Element of the eID or are SIM-based). This is a PKI-based mechanism where the user's private key signs a challenge from the authentication server, and thus validates the user without any manual interaction with the primar​​y access device. While the use of such mobile devices adds convenience, it also introduces some challenges for online authentication. 

Coesys mGovGemalto mGov solution enables citizens to use their phones as an authentication and signature tool in an environment they can trust, opening the door to a rich array of eGov services. It is a state of the art mobile application enabling a mobile strong digital authentication solution that allows citizens to access online government services using a combination of their contactless national eID card and NFC phone. Credentials can be stored in any Secure Element. As a result, it allows authorities to put in place Trusted National Mobile ID schemes.  It is also flexible enough to fit perfectly with a government's existing digital identity and security strategy: the level of authentication can be adapted according to the nature of the online services being ​accessed. 

To further simplify the user experience, Gemalto's Mobile ID solutions such as mGov support the creation of Derived Credentials on the SIM card itself, any Secure Element, or even in the cloud. This key feature will answer any use cases needed by government, in line with their wider strategy and the challenges specific to the country concerned. 

Derived Credentials can be used not only for authentication and signature purposes, but also to create a Digital Companion.


 Read more about Mobile ID

  • National Mobile ID schemes Volume II: Governance, scope and technologies

    National Mobile ID schemes Volume II: Governance, scope and technologies

    This white paper presents the role of public authorities, the scope of mobile ID for Smart Cities in particular as the new frame of reference, some thoughts on potential models based on non-sovereign or social network operators and an overview of mobile authentication technologies.

    National Mobile ID schemes Volume II: Governance, scope and technologies
  • National Mobile ID schemes

    National Mobile ID schemes

    Many e-government operations around the world are now considering a functional mobile ID scheme. A good starting point is learning more about what pioneer countries have already experienced in terms of eID and mobile ID and models of partnership with banks and operators.

    National Mobile ID schemes [PDF - 660kb]
​​​ ​​ ​​​