IDnomic for documents: eID, passports, digital documents
IDnomic for documents delivers the trusted infrastructure required to ensure the integrity of identity documents like passports and electronic identification (eID). The solution also enables systems to validate the authenticity and integrity of electronic messages.
With IDnomic for documents:
► Secure citizen’s travel documents as well as electronic documents and transaction managed by governmental agencies
► Reliably determine the precise date and time when a transaction happened
► Transform any document into a legal binding document and comply with regulations.
To follow or contact us:
IDnomic for documents: use cases
Verification of a document’s authenticity
and data protection.
Prove the authenticity of a document and
guarantee that it has not been altered.
Completed by a mechanism to prevent
unauthorized access to the document.
Travel document inspection
Advanced protection of the most sensitive
Secure access to a passport’s confidential
biometric data by authenticating both the
document and the inspection system.
Electronic signature / SEAL
Equivalent to traditional handwritten
signature for digital documents, extension
of its use to signatures by machines and
Prove a document’s authenticity by linking
it to the identity that issued it and by
guaranteeing that it was not altered after
Designed for use by an effective electronic signature solution.
3 modular functional blocks
IDnomic’s PKI technologies are divided into three modular and complementary functional blocks which lie at the core of our four digital identity solutions. Each block enables a step in the delivery and management of digital identity proof. One or more modules of each of these three blocks is activated as needed.
ID Trust is the cornerstone of IDnomic’s solution range. It generates and manages digital identity thanks to a robust technical baseline that meets the highest standards granting trust.
Its different modules can be used to:
► Create and generate certificate authorities
► Generate the various types of digital certificates
► Issue lists of invalid (revoked) certificates
► Generate timestamp tokens
► Save and recover private keys (escrow and recovery).
ID Manage is the block that controls identities. It steers all IDnomic technology and ensures that each request for digital identity proof is legitimate.
Its different modules can be used to:
► Manage certificate demand and oversee its lifecycle
► Give certificate status
► Sign official documents
► Publish in a directory
► Product reporting and audit data.
ID Connect delivers digital identities to trust equipment. This functional block connects the identity engine to its environment.
Its different modules can be used to:
► Automate the digital identity of every object and machine
► Address all types of mobile phones and PCs
► Deliver an identity on cryptographic devices (physical and virtual smart cards) and in the Windows certificate store
► Assign or revoke a digital identity via a GUI or an API
► Automate the lifecycle of Windows certificates.
IDnomic offers the deployment method that best suits your needs
With our on-premise offer, our solutions are installed in your infrastructure. You benefit from increased autonomy in terms of configuration while managing security at the local level.
Both our cloud offerings help you save on the induced costs of operating a local infrastructure while ensuring the highest standards in terms of security, performance and availability coupled with an ongoing upgrade that guarantees covering updates and maintenance.
► Cloud in “configuration” mode means you stay in control of the configuration and parameters of your security services.
► Cloud in “use” mode allows you to focus on securing your digital practices while we take care of everything else.
Type of deployment
|On-premise||Cloud “Setup” mode||Cloud “user” mode|
IT & Staff costs
Our consulting team of highly experienced professionals helps you to design and implement secure digital identities in complex environments to achieve a successful digital transformation, in line with your cybersecurity strategy. Benefit from our experience and technology to protect your users, objects, machines, documents and transactions.
► Migrate your PKI to the cloud
► Secure mobility for your business
► Use biometrics to enhance security
► Extend security to your new use cases
► Optimize the way you use your PKI
► Comply with eIDAS for e-signature
► Secure your IoT infrastructures
► Protect your data, comply with GDPR.
To offer a high-level, trusted service aligned with clients’ needs, IDnomic provides a secure, high-performing cloud infrastructure, based on audited, certified and labelled software, hardware, policies and operational procedures.
► Tier 4 security: Atos’s datacenter offers best-in-class guarantee and compliance with the most stringent standards
► French RGS regulation and eIDAS certified datacenter
► Datacenter security and disaster recovery plan
► IDnomic solutions is in the process of getting SecNumCloud certified
► Atos’s datacenters offers high-quality, reliable, efficient and fully secure services.
You’ll benefit from sound advice and know-how acquired through our extensive experience in wide-scale project rollout for international key accounts. A single point of contact centralizes actions and synchronizes all IDnomic services. To ensure we fulfill our commitments, we conduct risk analysis at the beginning of your project to evaluate any points requiring special attention, and schedule regular check-ups for rigorous milestone monitoring.
► Risk analysis and management
► Technical and functional expertise
► Sound knowledge of standards (eIDAS, RGS, etc.)
► Collaborative workshops to build your skills and ensure close collaboration
► Anticipation of integration issues in customer environment
► Proven key ceremony procedures…
Establishing a trust environment that is closely aligned with use cases requires to secure the infrastructure and software used to generate and store digital identities. Atos guarantees a maximum level of security by performing key ceremonies in a highly secure environment.
The conditions for generating and storing cryptographic keys are defined during the key ceremony. These keys are generated and stored directly in a cryptographic hardware security module (HSM).
Key custodians ensure the secrecy and are requested to be physically present during the key ceremony. The procedure is led by a master of ceremonies in a secure, fully isolated room located at IDnomic’s premises. Based on stringent, clearly defined and established procedures, the key ceremony makes it possible to:
► Create and renew certification authorities
► Create a certification authority revocation list
► Migrate HSMs when equipment reaches the end of its life
► Move from an on-premise PKI to IDnomic’s SaaS PKI.
Once the ceremony has been completed, a session is held to archive the cryptographic keys in a secure space or vault.
The key ceremony and vault deposit are crucial procedures for ensuring that certification authorities are held securely, they also provide an assurance to clients that their secrets are generated and stored in accordance with the industry best practices and that they can have real confidence and trust in the environment created by IDnomic for their needs.
IDnomic’s facilities are compliant with the strictest security requirements. These are dedicated rooms designed specifically for storing secrets.
Effective access identity control
► Strong authentication access control for authorized people (badge and biometrics)
► Double-control for room access.
24-7 video surveillance and intrusion detection
► Video surveillance and recording of access
► Alerts for entries at unauthorized times.
Access traceability management
► Video recording
► Entry and exit logs for this room.
IDnomic’s team is committed to offering you the best possible experience, with services aligned with your needs and the best software support. You will be able to quickly and efficiently benefit from our experts and their capacity to innovate.
Service guaranteed at all times
Our hotline service offers three levels of support to assist you throughout working hours without interruption. You also have access to the support portal for reporting incidents, discussing with our technical teams and tracking bugs’ resolution. We apply escalation procedures to ensure critical issues are addressed as quickly as possible.
► Times: 9am-6pm Monday to Friday
► Email and hotline
► Support services management platform
►24-7 Cloud support.
24/7 Cloud support with IDnomic’s team
Our teams guarantee a continuous service, optimized over time. They provide a full lifecycle management for applications and services (software updates, operating systems, servers, cryptographic equipment etc.).
A Service Delivery Manager team is responsible of ensuring a quality of service and providing visibility on the performance of the solution deployed. This team also organizes steering committees to look at potential optimizations and identify new requirements.
Centralized support for optimum service
A support services management platform enables you to centralize the management of your requests and requirements:
► Management of incident tickets, monitoring of progress and resolution
► New versions and updates
► Announcement of new features
► Access to the knowledge base
► Service level reports and statistics (exclusively on the Cloud).
You also have a log collection tool for quick and comprehensive analysis of any event. This helps us to quickly identify issues and resolve incidents efficiently.
Lifecycle guarantee for our software
IDnomic’s software are constantly evolving and offering new features and new compatibilities with the ecosystem. You benefit from the most recent software releases and updates thanks to our support services management platform. IDnomic ensures that you have the most secure and stable software at all times.
To extend your software use or deploy your service on more digital identities, please contact our sales team.
Professional training is a key success factor for businesses today. It enables them to develop their employees’ skills and support the structural and organizational changes needed to meet their business’ challenges.
IDnomic is a certified training organization (accreditation number: 11 92 19072 92), registered with the Paris Region’s Regional Directorate for Business, Competition, Consumer Affairs and Employment (DIRECCTE).
IDnomic’s training program is designed to develop your own skills and is for Security Officers, PKI solution operators, IT company staff, project managers, systems and network architects / administrators…
With IDnomic solutions, discover four digital identity solutions based on our PKI technologies are available to secure all your digital practices.
ID PKI suite, the digital identity platform by IDnomic, helps you protect digital data transfers and manage credentials stored in any type of cryptographic device, while meeting the highest criteria when it comes to security, quality and robustness.
To help you place digital trust at the very heart of your business, IDnomic teams are at your service at each stage of your project to fulfi ll your strategic choices and ambitions and to help you place digital trust at the very heart of your business.
Other PKI and HSM solutions
IDnomic for usersProtect the digital identities of your users.
Visit solution page >
IDnomic for objectsProtect the digital identities of your machine and connected object.
Visit solution page >
IDnomic for transactionsProvide the information needed to verify the digital identity.
Visit solution page >
Trustway HSMEnsure to your company a total sensitive data protection
Visit product page >