Gemalto is supporting DGSN, the General Delegation for National Security in Cameroon, in tackling fraud and document counterfeiting with the deployment of Sealys Color in PC for polycarbonate eID cards, a first in Africa. This innovative approach consists in laser engraving high resolution color photos into the durable Sealys card body to provide Cameroon with…
Category: eID
DRC selects Gemalto mobile biometric enrollment solution to support fair elections
Gemalto has won an international tender to supply CENI, the National Independent Electoral Commission of the Democratic Republic of Congo (DRC), with 22,000 mobile biometric voter enrollment kits to support a comprehensive update of the country's national voter register. Gemalto's fully portable Coesys Mobile Enrollment stations will enable 18,000 enrollment centers to rapidly acquire digital photographs, fingerprint and signature records…
The Angola National ID program – A building block of democracy
By Rob Haslam, HID Global Government ID Solutions (May 2015) While government agencies have not traditionally been viewed as industry innovators, the tide is changing. Government organizations at all levels are increasingly partnering with leaders in the private sector to make infrastructure investments that will take them well into the future. Perhaps, the most obvious reason…
X INFOTECH collaborates with Elyctis to advance quality control in eID document issuance
Latvia's X INFOTECH, a global system integrator for electronic identity (eID) projects and a Silicon Trust partner, will now include Elyctis know-how in the company’s offering in order to deliver a comprehensive, all-in-one solution for ePassport and eID card issuance. X INFOTECH’s solutions perform all the necessary functions to manage the entire production workflow for efficient and…
The 4 prime element of a modern eID project
By Benjamin Drisch und Adam Ross, cryptovision. Modern eID document project requirements often ask for a variety of elements, but can be distilled into the four prime elements of multi-application, multi-segmentation, secure in-field application loading and data management. Each has its own set of unique challenges and care should be taken to cover each requirement…