DESIGN AND IMPLEMENTATION OF NATIONAL IDENTITY CARD MANAGEMENT SYSTEM (A case study of NIMC)

ABSTRACT

Identity management systems have existed for 8 years now in Nigeria, being a useful component of national development in all economic systems. The implementation of identity management system with respect to multilateral security is the change that is obtainable within the last 8 years. Despite several debates on the implementation of Identity Management System in Nigeria.

IDMS stands to play an important role on economic growth, social capital and political development in a country. It is argued that IDMS represents a new “General Multi-Purpose Smart Card” with the potential view to link a secure database with biometric verifications for an individual identity. It is also generating a sustained increase in economic growth through processes of technological development and innovation. Government sees the application and use of Identity Management System as generating higher national productivity, job creation, competitiveness and national development.

 

CHAPTER 1

INTRODUCTION

Identity management system refers to an information system or to a set of technologies that can be used for enterprise or across network identity management. Identity management system also refers to a set of technologies that enable the users to control the Nature and the amount of personnel information released (Claubet-al, 2001).

According to National Identity Management Commission, there is no documented history. Implementation is the realization of an application, or execution of a plan, idea, model, design specification, standard algorithm or policy.

The identity of a person comprises a huge amount of personal data with respect to individuals. All subsets of the identity represents the person (or components of the person). Some of not. Depending on the situation and the context, the person may be represented by different partial identities.

The National Identity Management System NIMS comprises of National Identity Database (also known as a central identity repository or register (CIDR), a chip-based, secured identity card, and a network of access and means to irrefutable assert the identity of an individual. It also includes the harmonization of existing identity database in public sectors. The most important thing about the National Identity Management System is that it will provide a universal identification infrastructure for the entire country. This will help bring real and recognizable benefits to the government, each of us, individually and collectively and also for legal residents in Nigeria.

Identity management is a term that refers broadly to the administration of individual identities within a system, such as a company, a network or even a country. In enterprise IT, identity management is about establishing and managing the roles and access privileges of individual network users. Identity management systems provide IT managers with tools and technologies for controlling user access to critical information within an organization. The identity management system in the digital world relates to the behavior of persons in everyday activities (Claub & Kohn et-al., 2001).

Identity management system in the context of privacy enhancing technologies focused on anonymity and authenticity contains the concept of an identity protector that have been built, but in most cases not directly controlled by the user, or at least not in her own sphere of control. Implementation in the context of “security in communication technologies” focused on reachability as it contains a concept for user identification and the way users handle identity functions (David, 1985).

 

1.1 STATEMENT OF THE PROBLEMS

The growing complexity and decreasing transparency of the world is a serious problem that we cannot solve entirely by an identity manager. This growing complexity increases the difficulty of the identity manager to visualize the degree of privacy in supporting the user because a potential risk could easily be under-or over-estimated.

 

1.2 OBJECTIVES OF THE STUDY

The main objective of this research is to examine the importance of implementing an identity management system in Nigeria. While the specific objectives are as follows:

  1. To determine how a unique National Identity Number is issued to qualified citizens and legal residents.
  2. To determine how a National Identity Smart Card is issued to every registered person 16 years and above.
  3. To ensure the security of National Identity database.

SCREEN SHOTS OF THE APPLICATION

1.4 SIGNIFICANCE OF THE STUDY

 

Any research undertaken could be beneficial to the researcher, institution and other interested parties. A good knowledge of

Identity Management System and how best to implement it, will help Universities’ Management to verify people’s identity through the issuing of national identity number (NIN) which one can use to go into any institution and be readily accepted:

    I.        Provide a convenient and simplified process for enrollment into the national identity database for the issuance and use of the national identification number (NIN) and the national identity (Smart) card.

  II.        Help protect you from identity theft and fraud by providing a simple, reliable, sustainable and universally acceptable means of confirming your identity at all time.

  1. Make life easier by providing you with an easy and convenient means of providing your identity anywhere in Nigeria and beyond.
  2. Help reform our political process by facilitating the work of the managers of electoral process.

  V.        Make it harder for criminal to use false or multiple/duplicate/ghost identities.

 

1.6 SCOPE OF THE STUDY

 

The research is designed to highlight the importance of implementing an Identity Management System to the Nigerian economy, security and development.

1.7 DEFINITION OF TERMS

Identity - the fact of being who or what a person or thing is.

Management - the process of dealing with or controlling things or people.

Identity Management System - describes the management of individual identities, their authentication, authorization, roles and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks.

Chip-based - is an embedded microprocessor chip in payment cards such as credit and debit cards which stores and protects cardholder data.

Database - a structured set of data held in a computer, especially one that is accessible in various ways.