The use of modern information and communication technologies allows extremely extensive process optimization in many areas of social and business coexistence.

Many aspects of day-to-day life require people to travel to distant locations in order to complete transactions with other individuals or institutions or to enter into contracts.

In theory, using the above-mentioned information and communication technologies makes it possible to complete such transactions remotely. On closer examination, however, this facility quickly falters due to the need to identify those involved with certainty.

In-situ identity checking, for instance by comparing against a personal ID, is usually impossible because of the spatial separation involved.

This state of affairs makes the need for digital identities clearly evident. Because an individual is not physically present, alternative technical means must be devised in order to make remote and even global interactions binding and verifiable.


Suitable digital identities

Standardized procedures that make it possible to generate and administer digital identities in the form of certificates, for instance, have become internationally established in recent years.

A certificate is an electronic collection of identity attributes such as a name, address, date of birth.

There are various international institutions that certify the credibility of such certificates. These authorities which confirm that identity attributes pertain to a particular user operate under the generic name of “trust centers”. To achieve this, a comparison against a physical identity document is performed either by the trust center itself or by registration authorities that are recognized by the trust center.


Basic principle

This is generally based on the principle of a public key scheme. With this method, pairs of keys are generated for all the parties involved and part of them is declared as the public key. The second, secret part should ideally be kept securely enough to ensure that it cannot be copied, thus making it possible to control the use of the key.

The first part of the key makes it possible to check whether the secret key, as claimed, has been applied to specific information.

In the simplest case, the public key can be distributed together with the name or the alias of its owner as a digital identity.



With the TeleSec NetKey/ IDKey, you get a particularly premium digital key that enables you to protect yourself against the many annoyances of the Internet and upgrade your presence in this “virtual world”.

And all these capabilities are literally within your grasp.

You receive a smartcard of the kind used in many applications such as a health insurance card or a cash card. NetKey/ IDKey is a smartcard that was specially developed for security applications. Secret keys generated using state-of-the-art expertise are stored in the chip on this card during the manufacturing process. There are no copies of these keys and the keys cannot be read out from the card given the present state of the art.

These keys are only used if the card is presented with the valid password, commonly referred to as the PIN. Using secret keys makes it possible to unambiguously assign actions to the individual or a system for which the smartcard was registered.

TeleSec NetKey/ IDKey also allows the confidential exchange of information or encrypted data storage. All data that is encrypted with the aid of public keys can only be decrypted again using the relevant secret key, i.e. the NetKey/ IDKey.