{"id":4361,"date":"2013-10-17T08:59:26","date_gmt":"2013-10-17T07:59:26","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=4361"},"modified":"2019-12-31T11:31:10","modified_gmt":"2019-12-31T10:31:10","slug":"identite-numerique-de-nombreuses-initiatives-a-travers-le-monde","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/","title":{"rendered":"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde"},"content":{"rendered":"<p><em>Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des\u00a0 identit\u00e9s, lutte contre les fraudes\u00a0: c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques \u00a0qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921.\u00a0 Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te\u00a0: la confiance envers les identit\u00e9s dans le monde num\u00e9rique pose des probl\u00e9matiques similaires, ainsi que nous vous le pr\u00e9sentions dans un pr\u00e9c\u00e9dent article. Tour d\u2019horizon des initiatives existantes.<\/em><\/p>\n<h2>Des principes de bases partag\u00e9s mais des divergences dans leur application<\/h2>\n<p>De nombreux pays tentent, \u00e0 leur \u00e9chelle, de r\u00e9pondre aux enjeux de l\u2019identit\u00e9 num\u00e9rique. Ces initiatives partagent les m\u00eames principes de base, calqu\u00e9s sur ceux de l\u2019identit\u00e9 r\u00e9elle. En revanche, elles divergent sur la mise en application de ces principes : acteurs autoris\u00e9s \u00e0 \u00e9mettre des identit\u00e9s num\u00e9riques, stockage des donn\u00e9es personnelles, caract\u00e8re universel ou non, etc. Ces sp\u00e9cificit\u00e9s ont pour objectif de fa\u00e7onner une identit\u00e9 num\u00e9rique au plus pr\u00e8s de la culture de chaque pays.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.solucominsight.fr\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/image-1-identite-numerique\/\" rel=\"attachment wp-att-4362\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4362 aligncenter\" title=\"Image 1 identit\u00e9 num\u00e9rique\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2013\/10\/Image-1-identit\u00e9-num\u00e9rique.png\" alt=\"\" width=\"620\" height=\"406\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/Image-1-identit\u00e9-num\u00e9rique.png 620w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/Image-1-identit\u00e9-num\u00e9rique-292x191.png 292w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/Image-1-identit\u00e9-num\u00e9rique-60x39.png 60w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<h2>L\u2019\u00e9mission des identit\u00e9s num\u00e9riques\u00a0: par l\u2019\u00c9tat, mais pas uniquement<\/h2>\n<p>Contrairement au monde r\u00e9el, ce sont les acteurs priv\u00e9s qui ont \u00e9t\u00e9 force d\u2019initiative sur Internet. Par exemple Yahoo, Facebook, Google ou d\u2019autres sites proposent d\u2019ores et d\u00e9j\u00e0 de vous authentifier sur des sites tiers. Mais attention, si ce mode de fonctionnement apporte un r\u00e9el confort aux utilisateurs, ces identit\u00e9s restent d\u00e9claratives, sans r\u00e9ellement am\u00e9liorer le niveau de confiance associ\u00e9. En effet, personne n\u2019a v\u00e9rifi\u00e9 que vous \u00eates bien la personne que vous pr\u00e9tendez \u00eatre.<\/p>\n<p><strong>Comment alors v\u00e9rifier les informations fournies et am\u00e9liorer la fiabilit\u00e9 des identit\u00e9s\u00a0?<\/strong><\/p>\n<p>C\u2019est souvent l\u2019<strong>\u00c9tat<\/strong> qui se charge de v\u00e9rifier et d\u00e9livrer les Identit\u00e9s num\u00e9riques de confiance. Toutefois, et principalement pour des raisons culturelles, cette responsabilit\u00e9 peut \u00eatre d\u00e9l\u00e9gu\u00e9e \u00e0 des <strong>entreprises priv\u00e9es<\/strong>, parfois sous contr\u00f4le de l\u2019\u00c9tat. C\u2019est notamment le cas au Royaume-Uni, o\u00f9 il n\u2019existe pas de carte d\u2019identit\u00e9. La derni\u00e8re tentative du gouvernement pour introduire une carte d\u2019identit\u00e9 en 2010 n\u2019a pas surv\u00e9cu \u00e0 son impopularit\u00e9. Le gouvernement s\u2019est alors tourn\u00e9 vers les mod\u00e8les am\u00e9ricains et canadiens, en choisissant de confier la d\u00e9livrance d\u2019Identit\u00e9s num\u00e9riques \u00e0 des acteurs priv\u00e9s. Ainsi, il est possible de se connecter certains sites administratifs de l\u2019\u00c9tat avec une Identit\u00e9 num\u00e9rique fournie par <em>Paypal<\/em> ou <em>The Post Office<\/em>.<\/p>\n<h2>Des donn\u00e9es personnelles stock\u00e9es de mani\u00e8re centralis\u00e9e ou port\u00e9es par chacun<\/h2>\n<p>Autre point structurant de divergence entre les initiatives\u00a0: le stockage des donn\u00e9es d\u2019identit\u00e9.<\/p>\n<p><strong>Le plus souvent, les informations d\u2019Identit\u00e9 num\u00e9rique se pr\u00e9sentent sous la forme d\u2019une carte \u00e0 puce<\/strong>. Celle-ci contient peu ou prou les m\u00eames informations qu\u2019une carte d\u2019identit\u00e9 traditionnelle, ainsi que des certificats \u00e9lectroniques prot\u00e9g\u00e9s par un code PIN. Elle peut \u00eatre int\u00e9gr\u00e9e \u00e0 la carte d\u2019identit\u00e9 physique, ou \u00eatre contenue dans un support d\u00e9di\u00e9 (carte \u00e0 puce, cl\u00e9 USB, carte SIM du t\u00e9l\u00e9phone portable\u2026).<\/p>\n<p><em>\u00c0 contrario<\/em>, l\u2019<strong>Inde a pris le parti de centraliser les donn\u00e9es biom\u00e9triques de ses citoyens dans une base de donn\u00e9es unique<\/strong>. D\u2019ici 2015, le gouvernement esp\u00e8re enregistrer dans un fichier centralis\u00e9 les empreintes digitales et r\u00e9tiniennes de la moiti\u00e9 de la population. Avec un terminal biom\u00e9trique, toute administration ou commer\u00e7ant affili\u00e9 peut alors identifier une personne. Notons que, en l\u2019\u00e9tat actuel, un tel dispositif ne pourrait \u00eatre transposable en France, la CNIL interdisant l\u2019utilisation d\u2019une base de donn\u00e9es biom\u00e9trique centralis\u00e9e, sauf pour \u00ab\u00a0fort imp\u00e9ratif de s\u00e9curit\u00e9\u00a0\u00bb<sup>1<\/sup>.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.solucominsight.fr\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/exemples\/\" rel=\"attachment wp-att-4363\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4363 aligncenter\" title=\"exemples\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2013\/10\/exemples.png\" alt=\"\" width=\"502\" height=\"577\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/exemples.png 502w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/exemples-166x191.png 166w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/exemples-34x39.png 34w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/a><\/p>\n<h2>D\u00e9ployer l\u2019identit\u00e9 num\u00e9rique\u00a0: l\u2019exemple Estonien<strong>\u00a0<\/strong><\/h2>\n<p>L\u2019initiative de l\u2019Estonie se d\u00e9marque cependant par son niveau d\u2019adoption et le caract\u00e8re universel de l\u2019usage de l\u2019identit\u00e9 num\u00e9rique, tant dans le monde num\u00e9rique que dans le monde r\u00e9el. Gr\u00e2ce \u00e0 un badge remis \u00e0 tout citoyen (ou \u00e0 la carte SIM de leur mobile), les estoniens sont en mesure depuis 2002 de certifier dans le monde num\u00e9rique leur identit\u00e9, et toute information personnelle qui s\u2019y rattache (\u00e2ge, sexe, domicile, etc.). Plus qu\u2019une carte d\u2019identit\u00e9 d\u00e9mat\u00e9rialis\u00e9e, cette identit\u00e9 num\u00e9rique est pleinement int\u00e9gr\u00e9e \u00e0 leur quotidien. Moyens de transport, transactions bancaires, d\u00e9clarations fiscales, inscriptions \u00e0 l\u2019universit\u00e9, cr\u00e9ations d\u2019entreprise, etc. Elle permet m\u00eame de voter aux \u00e9lections nationales.<\/p>\n<p><em>L\u2019Estonie fait figure d\u2019exception, \u00a0les niveaux d\u2019adoption restant g\u00e9n\u00e9ralement faibles et les d\u00e9ploiements limit\u00e9s \u00e0 des usages cibl\u00e9s. L\u2019Identit\u00e9 num\u00e9rique existe malgr\u00e9 tout aujourd\u2019hui dans plusieurs pays, et notamment en Europe. Qu\u2019en est-il de la France\u00a0? Des initiatives sont-elles \u00e0 y souligner\u00a0? La r\u00e9ponse est oui.<\/em><\/p>\n<p><em>\u00c0 suivre au 3<sup>\u00e8me<\/sup> \u00e9pisode\u2026<\/em><\/p>\n<div>\n<div>\n<p><sup>1<\/sup> <a href=\"http:\/\/www.cnil.fr\">cnil.fr<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des\u00a0 identit\u00e9s, lutte contre les fraudes\u00a0: c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques \u00a0qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921.\u00a0 Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te\u00a0: la confiance envers les identit\u00e9s dans&#8230;<\/p>\n","protected":false},"author":205,"featured_media":4269,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[144,3311],"coauthors":[1333,1337],"class_list":["post-4361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-identite","tag-identity-access-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde<\/title>\n<meta name=\"description\" content=\"Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des identit\u00e9s, lutte contre les fraudes : c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921. Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te : la confiance envers les identit\u00e9s dans le monde num\u00e9rique pose des probl\u00e9matiques similaires, ainsi que nous vous le pr\u00e9sentions dans un pr\u00e9c\u00e9dent article. Tour d\u2019horizon des initiatives existantes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde\" \/>\n<meta property=\"og:description\" content=\"Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des identit\u00e9s, lutte contre les fraudes : c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921. Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te : la confiance envers les identit\u00e9s dans le monde num\u00e9rique pose des probl\u00e9matiques similaires, ainsi que nous vous le pr\u00e9sentions dans un pr\u00e9c\u00e9dent article. Tour d\u2019horizon des initiatives existantes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-17T07:59:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:31:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_-56x39.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"56\" \/>\n\t<meta property=\"og:image:height\" content=\"39\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Catherine Kherian, Thomas Karmann\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Catherine Kherian, Thomas Karmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/\"},\"author\":{\"name\":\"Catherine Kherian\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8d497652dbb39cd12c6075c8489cf26f\"},\"headline\":\"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde\",\"datePublished\":\"2013-10-17T07:59:26+00:00\",\"dateModified\":\"2019-12-31T10:31:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/\"},\"wordCount\":853,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg\",\"keywords\":[\"identit\u00e9\",\"identity &amp; access governance\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/\",\"name\":\"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg\",\"datePublished\":\"2013-10-17T07:59:26+00:00\",\"dateModified\":\"2019-12-31T10:31:10+00:00\",\"description\":\"Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des identit\u00e9s, lutte contre les fraudes : c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921. Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te : la confiance envers les identit\u00e9s dans le monde num\u00e9rique pose des probl\u00e9matiques similaires, ainsi que nous vous le pr\u00e9sentions dans un pr\u00e9c\u00e9dent article. Tour d\u2019horizon des initiatives existantes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg\",\"width\":3800,\"height\":2660},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8d497652dbb39cd12c6075c8489cf26f\",\"name\":\"Catherine Kherian\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/catherine-kherian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde","description":"Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des identit\u00e9s, lutte contre les fraudes : c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921. Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te : la confiance envers les identit\u00e9s dans le monde num\u00e9rique pose des probl\u00e9matiques similaires, ainsi que nous vous le pr\u00e9sentions dans un pr\u00e9c\u00e9dent article. Tour d\u2019horizon des initiatives existantes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/","og_locale":"en_US","og_type":"article","og_title":"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde","og_description":"Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des identit\u00e9s, lutte contre les fraudes : c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921. Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te : la confiance envers les identit\u00e9s dans le monde num\u00e9rique pose des probl\u00e9matiques similaires, ainsi que nous vous le pr\u00e9sentions dans un pr\u00e9c\u00e9dent article. Tour d\u2019horizon des initiatives existantes.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/","og_site_name":"RiskInsight","article_published_time":"2013-10-17T07:59:26+00:00","article_modified_time":"2019-12-31T10:31:10+00:00","og_image":[{"width":56,"height":39,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_-56x39.jpg","type":"image\/jpeg"}],"author":"Catherine Kherian, Thomas Karmann","twitter_misc":{"Written by":"Catherine Kherian, Thomas Karmann","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/"},"author":{"name":"Catherine Kherian","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8d497652dbb39cd12c6075c8489cf26f"},"headline":"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde","datePublished":"2013-10-17T07:59:26+00:00","dateModified":"2019-12-31T10:31:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/"},"wordCount":853,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg","keywords":["identit\u00e9","identity &amp; access governance"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/","name":"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg","datePublished":"2013-10-17T07:59:26+00:00","dateModified":"2019-12-31T10:31:10+00:00","description":"Simplification des proc\u00e9dures administratives, uniformisation des proc\u00e9dures de v\u00e9rification des identit\u00e9s, lutte contre les fraudes : c\u2019est pour r\u00e9pondre \u00e0 ces probl\u00e9matiques qu\u2019appara\u00eet en France\u2026 la carte nationale d\u2019identit\u00e9, en 1921. Aujourd\u2019hui l\u2019Histoire se r\u00e9p\u00e8te : la confiance envers les identit\u00e9s dans le monde num\u00e9rique pose des probl\u00e9matiques similaires, ainsi que nous vous le pr\u00e9sentions dans un pr\u00e9c\u00e9dent article. Tour d\u2019horizon des initiatives existantes.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2013\/10\/\u00a9-Sergey-Nivens-Fotolia.com_.jpg","width":3800,"height":2660},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/identite-numerique-de-nombreuses-initiatives-a-travers-le-monde\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Identit\u00e9 num\u00e9rique : de nombreuses initiatives \u00e0 travers le monde"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8d497652dbb39cd12c6075c8489cf26f","name":"Catherine Kherian","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/catherine-kherian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=4361"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4361\/revisions"}],"predecessor-version":[{"id":8147,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4361\/revisions\/8147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/4269"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=4361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=4361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=4361"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=4361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}