Blog

Blogbeiträge

Press releases

Um Blogbeiträge zu einem bestimmten Thema zu finden, klicken Sie auf eines der gängigsten Schlüsselwörter.

Digital ID
Blogbeitrag

eIDAS 2.0 - Introduction to The European Digital Identity Wallet & The Evolution of Self-Sovereign Identity

The European Commission proposed an update to its pan-European digital identity framework. It will enable every European to have a set of digital identity credentials that are recognized all across the EU.
Digital ID
Blogbeitrag

eIDAS 2.0. Moving Closer - European Digital Identity Wallet (EDIW) and Pilot Implementation

The European Commission has now proceeded to test technical specifications for the Common Toolbox for European Digital Identity and a prototype of a Digital Identity Wallet.
digital certificate
Blogbeitrag

eIDAS 2.0 - Roadmap, Toolbox, and The European Digital Identity Architecture

EUDI Wallets are mobile applications or cloud services that collect and store digital credentials and allow them to be used secretly and securely for numerous government and non-government use cases.
Electronic ID
Blogbeitrag

Electronic Identity (eID): Government versus Privatization - A European / United States comparison

This article highlights two very different digital identity strategies, as well as the various differences between a government-managed and a privatized solution.
a man typing on the computer
Blogbeitrag

The Open Finance API & the requirement for eIDAS Certificates and Qualified Signature Creation Devices

Open Finance is driven by technologies such as open APIs. It is a publicly available application programming interface with programmatic access to a proprietary software application or web service – a set of requirements that control how one application communicates and interacts with another.
a girl is holding a phone
Blogbeitrag

Understanding the Role of Hardware Security Modules in Digital Signing

The standards mandated by eIDAS work to ensure the integrity of electronic signatures. However, what is also mandated is the need for sufficiently protecting the cryptographic processes.
digital avatar
Blogbeitrag

Understanding the Role of Hardware Security Modules in Digital Identities for Humans

eIDAS created standards for trust services to ensure that digital identities, including those for humans remain secure. Here we will examine the role that HSMs play in securing digital identities for humans.
digital map with icons
Blogbeitrag

The Open Finance Ecosystem & the Standards for Secure Identification & Sharing of Data

Open Finance is seen as the natural evolution to Open Banking - extending the use of open data beyond traditional payment accounts to encompass an individual’s complete financial landscape, putting control in the hands of the customer and promoting full financial inclusion.
European Digital Identity Trust Framework
Blogbeitrag

The European Digital Identity Trust Framework & Qualified Trust Services

This article explains the Trust Framework and the ‘digital wallet’ requirement for remote eIDAS qualified electronic signatures, seals and qualified signature creation devices (QSCDs).
blog-how-blockchain-allows-car-manufacturers
Blogbeitrag

How Blockchain Allows Car Manufacturers to Create Digital Passports

This article explains how blockchain technologies can allow car manufacturers to offer irrefragable digital passports for the buyers and owners of the vehicles they sell.
blog-an-introduction-to-the-regulatory-technical-standards-part-3
Blogbeitrag

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 3: Achieving Transactional & Account Security

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.
blog-an-introduction-to-the-regulatory-technical-standards-part-2
Blogbeitrag

An Introduction to the Regulatory Technical Standards for Strong Customer Authentication – Part 2: PSD2

eIDAS has been designed to allow for seamless (cross-border) operations while ensuring technological neutrality and flexibility in terms of how its minimum standards need to be met.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Ihre Download-Sammlung ist leer. Besuchen Sie unseren Download-Bereich und wählen Sie aus Ressourcen wie Datenblättern, Whitepapers, Webinar-Aufzeichnungen und vielem mehr.

      Downloads
      0