GSB 7.0 Standardlösung

Effective protection for your data

Four security mechanisms effectively protect your personal data:

  • The combination of possession and knowledge
    Only those who are in possession of your identity card and know your personal PIN can use the eID function.
    This procedure, known as two-factor authentication, is more secure than the common one-factor authentication with user names and passwords.
  • The requirements for data transmission
    Your data are transmitted only if the ID card is connected to the card reader, the smartphone or tablet computer and the PIN has been entered.
    This means that data cannot be retrieved without your knowledge. The data are also protected if your ID card is lost or stolen.
  • Reciprocal identification
    With the eID function, both sides always need to identify themselves. For this reason you can always see the recipient of your data. Your online business partner must have a valid government certificate to request your data. You can also view this certificate. If you agree you enter your PIN to transmit your data.
    Reciprocal identification improves your security in the digital world.
  • Encryption
    Data are transmitted only in encrypted form.
    End-to-end encryption protects your data against theft and misuse.

More information on

Additional Information