e- Estonia - 10 years of experience

Size: px
Start display at page:

Download "e- Estonia - 10 years of experience"

Transcription

1 e- Estonia - 10 years of experience Lessons learned Jüri Voore, Estonian Cer;fica;on Centre

2 PROJECT MILESTONES o First ideas in 1997 o Law on personal iden;fica;on documents: Feb, 1999 o Digital Signature Act: March, 2000 o Government accepted plan for launching ID- card: May, 2000 o 2001 : Tender for ID card produc;on & personalisa;on service won by Swiss TRÜB AG o Sept 2001 : Cer;fica;on service contract tendered to AS Ser;fitseerimiskeskus o First card issued: Jan 28, 2002 o October 2006: th card issued

3 MILESTONES VOL 2 o 2004 ID card as e- ;cket in public transport o 2005 world first Internet vo;ng o 2007 first mobile ID issued o 2011 new DigiDoc so\ware o 2011 mobile ID as na;onal electronic ID document o 2011 mobile ID used in Internet vo;ng o March 2012: users for e- services

4 WHAT IS ESTONIAN eid card o o eid card is Police and Borderguard Board issued ID + travel document. Max. validity 5 years It is mandatory document for all EST residents star;ng of age 15 o Contains: ü Visual personal informa;on ü Personal data file ü Cer;ficate for authen;ca;on (along with e- mail address Forename.Surname@ees;.ee) ü Cer;ficate for digital signature

5 110 DB X-road 5 ~ ~ April users users 550 org. 200 DB 1,100,000

6 SINGLE SOURCE FOR USERS ESTONIAN ID CARD, PKI AND DIGITAL SIGNATURES Jüri Voore Estonian Certification Center

7 o Common plajorm in Estonia - DigiDoc Full- scale architecture for digital signatures and documents ü Document format ü Program libraries (C, Java, COM) ü End- user client DigiDoc Client ü End- user portal DigiDoc Portal ü Webservice Application Win32 Client COM-library DigiDoc architect DigiDoc portal WebService Application Application o o o Based on interna;onal technical standards XML- DSIG, contains subset of ETSI TS extensions XAdES Includes real- ;me validity confirma;on of a cer;ficate (OCSP) Long- term validity of a documents is ensured MSSP Mobile-ID DigiDoc-library (Win/Unix/C/Java) OCSP XML CSP PKCS#11 ID card

8 ID-card versus Mobile ID Internetipank Internetipank ID card (PIN 1,2) ID card reader PC with ID card reader and ID card Mobile-ID SIM card (PIN 1,2) Mobile phone Any PC connected to public Internet

9 Description of the solution " SK has been offering mobile ID (MID) solution since 2007 " SK was driving development and implementation of requirements in " SK is offering the CA and TSP service for 4 different mobile operators " Unique toolset to combine WPKI and PKI possibilities

10 General architecture E-Services SK TSP Mobile Operators Time Stamp Service SK and other Certification Authorities

11 General technical architecture

12 Digital signature cost-benefit calculator There are 80 million digitally signed documents! All in all people/companies have saved The study carried out with University of Tartu, Eesti Loto and Eltel Networks showed that if the customer service time spent per customer is 10 minutes If the document consist of 4 pages If there are 2 copies If there are 500 documents in a month If 20% of the documents are sent by mail Company saves 9100 / a year Calculate how much money You could save

13 Focus on digital signature! o Public sector is obliged to accept digitally signed documents o Digital signature is universal ü Open user group ü Any rela;on government, business, private o Focus on document concept ü Equivalent to what we are doing on paper But how about cross- border digital signature?

14 LESSONS LEARNED project start o Important ques;ons in genng started: ü Is ID card mandatory or voluntary? Lessons ü Infrastructure Learned How or services to start first? o PKI enabled ID card is just a tool for accessing services. o Mo;va;on both service providers and users must have the necessity to use ID card for authen;ca;on and digital signing o Public- private partnership is vital ü It is reasonable to set up ONE COMMON Root- CA /trust chain ü Public investments are minimized by service contracts with private vendors ü Technology risks to be handled by private vendors o Time is the most valuable resource ü Public procurement disputes can mess up ;me- table ü Poli;cal and legal issues will take a lot of ;me

15 LESSONS LEARNED VOL. 2 o Posi;ve enforcement of electronic services o Use solu;ons based on proven interna;onal standards (if exist) o Share common infrastructure with private sector o Provide open source s/w tools and drivers o Distribute in mass ID card readers at affordable price o Main usage volume comes from private services not from e- government services o There is never too much promo;on and training for end users o Users privacy and security stands on a top o Learning by doing leads to mistakes admit, correct and learn from it o Avoid home- blindness and project fa;gue o Future is in mobile ID and

16 LESSONS LEARNED vol.3 Government: let the private sector take initiative promote all aspects of information society create and maintain the legislative framework view IT developments together with public administrative reform promote a project based development (more chance for selfcorrection, if something doesn t work) Count new channels as mobile and social media And finally, as government: take care of your culture and language (nobody else will do it for you)

17 Useful links: Thank you! Jüri Voore, Estonian Cer;fica;on Centre

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager Embedding digital signature technology to other systems - Estonian practice Urmo Keskel SK, DigiDoc Product Manager E-stonia? Population: 1.35M Internet usage: 54% Internet banking: 72% Mobile penetration:

More information

eauthentication in Estonia and beyond Tarvi Martens SK

eauthentication in Estonia and beyond Tarvi Martens SK eauthentication in Estonia and beyond Tarvi Martens SK E-stonia? Population: 1.35M Internet usage: 56% Internet banking: 88% Mobile penetration: >100% 1000+ Free Internet Access points PKI penetration:

More information

Digital Signatures in Reality. Tarvi Martens SK

Digital Signatures in Reality. Tarvi Martens SK Digital Signatures in Reality Tarvi Martens SK Free-flowing digital documents Estonia has deployed digitally signed documents which are recognised universally. These are: Perfectly legal For use in arbitrary

More information

The Estonian ID Card and Digital Signature Concept

The Estonian ID Card and Digital Signature Concept The Estonian ID Card and Digital Signature Concept Principles and Solutions Ver 20030307 Contents Contents...2 Status of the document...3 Introduction...3 Intended audience...3 Current project status...3

More information

IDENTITY ANYONE CAN TRUST

IDENTITY ANYONE CAN TRUST IDENTITY ANYONE CAN TRUST TRUST SERVICE PROVIDER SINCE 2002 SK provides full e-authentication and digital signature solutions for even the most demanding private and public services. We work on a level

More information

EHR central system advantages and disadvantages, the case of Estonia. Estonian E-health Foundation Raul Mill

EHR central system advantages and disadvantages, the case of Estonia. Estonian E-health Foundation Raul Mill EHR central system advantages and disadvantages, the case of Estonia Estonian E-health Foundation Raul Mill Estonia - 45 000 km2 1.29 mlj. inhabitants GDP: Agriculture 2,7% Industry 26,3% Service 74,5%

More information

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves Electronic Signature István Zsolt BERTA istvan@berta.hu Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,

More information

1. Lifecycle of a certificate

1. Lifecycle of a certificate 1 1. Lifecycle of a certificate 1. Client generates Signing Request (CSR) in his secure computer or server where application will be used. Now client has two s a CSR (usually with CSR extension but it

More information

Interoperability Support systems Nationwide components (Estonia)

Interoperability Support systems Nationwide components (Estonia) Interoperability Support systems Nationwide components (Estonia) July 6, 2007 Forum Standaardisatie, Netherland Uuno Vallner, PhD. Ministry of Economic Affairs and Communications ICT legislation (1) Personal

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

PKI Architecture for VISIONng Proposal by A-TrustA

PKI Architecture for VISIONng Proposal by A-TrustA PKI Architecture for VISIONng Proposal by A-TrustA October 2001 Stephan Grill grill@a-trust.at Overview Objective Products and Services of A-Trust Requirements Description of the PKI Architecture Certificates

More information

Trus%ng your Cloud Provider s System

Trus%ng your Cloud Provider s System Trus%ng your Cloud Provider s System Retaining Control over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and A>esta?on Vorarlberg University of Applied

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

PKI - current and future

PKI - current and future PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi

More information

Making Digital Signatures Work across National Borders

Making Digital Signatures Work across National Borders Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det

More information

X-Road. egovernment interoperability framework

X-Road. egovernment interoperability framework X-Road egovernment interoperability framework Serving e-nation over 10 years Backbone of the Estonian egovernment 12 years of active duty, no downtime Over 2000 connected e-services More than 900 connected

More information

Case Studies in Solving Testing Constraints using Service Virtualization

Case Studies in Solving Testing Constraints using Service Virtualization Case Studies in Solving Testing Constraints using Service Virtualization Rix.Groenboom@Parasoft.NL 2/21/14 1 Introduction Paraso& is supplier automated tes1ng solu1ons Since 1984, Los Angeles (US) and

More information

Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services. Ministry of Public Administrations

Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services. Ministry of Public Administrations Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services Ministry of Public Administrations Miguel Álvarez Rodríguez IT Manager Contents 1. The new eid citizen s

More information

An introduction to EJBCA and SignServer

An introduction to EJBCA and SignServer An introduction to EJBCA and SignServer PrimeKey Solutions AB Tomas Gustavsson http://www.primekey.se tomas@primekey.se EJBCA and SignServer Euro PKI projects and use cases 1 EJBCA - Open Source Enterprise

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Long term electronic signatures or documents retention

Long term electronic signatures or documents retention Long term electronic s or documents retention IWAP 2004 Yuichi Suzuki SECOM IS Laboratory IWAP 2004 Yuichi Suzuki (SECOM IS Lab) 1 Problem of validity period of certificate PKI does work well in a validity

More information

Signature policy for TUPAS Witnessed Signed Document

Signature policy for TUPAS Witnessed Signed Document Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for

More information

TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH. Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia

TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH. Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia To be discussed 1. From data accumulation to information

More information

eid/authentication/digital signatures in Denmark

eid/authentication/digital signatures in Denmark eid/authentication/digital signatures in Denmark 8. July 2008 Nikolas Triantafyllidis / Charlotte Jacoby Special Advisors Centre for Digital Signatures National IT- and Telecom Agency Authentication and

More information

Digital Signature Service. e-contract.be BVBA info@e-contract.be 2 september 2015

Digital Signature Service. e-contract.be BVBA info@e-contract.be 2 september 2015 Digital Signature Service e-contract.be BVBA info@e-contract.be 2 september 2015 About e-contract.be BVBA Consultancy Projects: eid/security related only SOA security From analysis to operational hosting

More information

Potential efficiency of digital signatures to Finnish SMEs. Tham Nguyen

Potential efficiency of digital signatures to Finnish SMEs. Tham Nguyen Potential efficiency of digital signatures to Finnish SMEs Tham Nguyen Bachelor s Thesis Degree Programme in International Business December 2014 Abstract 07.12.2014 Degree Programme in International Business

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana

More information

Using ISO/IEC 24727 for mobile devices

Using ISO/IEC 24727 for mobile devices Using ISO/IEC 24727 for mobile devices Jan Eichholz, Giesecke & Devrient GmbH Dr. Detlef Hühnlein, secunet Security Networks AG Manuel Bach, Bundesamt für Sicherheit in der Informationstechnik Eichholz/Hühnlein/Bach

More information

Best prac*ces in Cer*fying and Signing PDFs

Best prac*ces in Cer*fying and Signing PDFs over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL

More information

Egypt s E-Signature & PKInfrastructure

Egypt s E-Signature & PKInfrastructure EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:

More information

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos

More information

10/13/2008. Electronic document management. How can it be achieved? (2) Hannes Astok Based on the lecture of Raivo Ruusalepp - raivo@eba.ee www.eba.

10/13/2008. Electronic document management. How can it be achieved? (2) Hannes Astok Based on the lecture of Raivo Ruusalepp - raivo@eba.ee www.eba. Electronic document management How can it be achieved? (2) Hannes Astok Based on the lecture of Raivo Ruusalepp - raivo@eba.ee www.eba.ee Overload of electronic information Most or all documents are digital

More information

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,

More information

e-szigno Digital Signature Application

e-szigno Digital Signature Application MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353

More information

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex Submitted to the EC on 03/06/2012 COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex e-justice Communication via Online Data Exchange ICT PSP call identifier:

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

Setup and Maintenance Factors of Adap3ve Case Management Systems

Setup and Maintenance Factors of Adap3ve Case Management Systems Setup and Maintenance Factors of Adap3ve Case Management Systems Thanh Tran Thi Kim 1 Max Pucher 1 Jan Mendling 2 Christoph Ruhsam 1 1. ISIS Papyrus Europe AG {thanh.tran,max.pucher,christoph.ruhsam}@isis-

More information

ISO/IEC 24727 for secure mobile web applications

ISO/IEC 24727 for secure mobile web applications ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com

More information

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte

More information

EDI legal aspects in Estonia

EDI legal aspects in Estonia EDI legal aspects in Estonia Sharing the experience: einvoicing Riga, ECR Baltic seminar, April 15, 2010 Taavi Valdlo Department of State Information Systems Ministry of Economic Affairs and Communications

More information

Visual Enterprise Architecture

Visual Enterprise Architecture Business Process Management & Enterprise Architecture Services and Solutions October 2012 VEA: Click About to edit Us Master title style Global Presence Service and Solution Delivery in 22 Countries and

More information

Cer$ficates- as- an- Insurance (CaaI): Incen$vizing Accountability in SSL/TLS

Cer$ficates- as- an- Insurance (CaaI): Incen$vizing Accountability in SSL/TLS Cer$ficates- as- an- Insurance (CaaI): Incen$vizing Accountability in SSL/TLS Stephanos Matsumoto (CMU/ETH Zurich) Raphael M. Reischuk (ETH Zurich) Workshop on the Security of Emerging Network Technologies

More information

Number of relevant issues

Number of relevant issues Electronic signature Lecture 8 Number of relevant issues cryptography itself algorithms for signing documents key management generating keys, distribution, key revocation security policy certificates may

More information

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security

More information

Chhattisgarh State Power Companies

Chhattisgarh State Power Companies Chhattisgarh State Power Companies User Manual for e-bidding Version 2.0 Page 1 of 39 CONTENT 1. About E-tender Web Portal... 3 2. Pre-requisites to participate in Bidding... 4 3. PC/Laptop Settings...

More information

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of

More information

How to implement esignature validation

How to implement esignature validation www.peppol.eu How to implement esignature validation EU-Supply experience How to implement online validation Background Desired user experience How to implement Piloting, initial experiences Further information

More information

1. Project title Implementation of digital document management system in Tartu City Government 2001-2002 2. Background Information

1. Project title Implementation of digital document management system in Tartu City Government 2001-2002 2. Background Information 1. Project title Implementation of digital document management system in Tartu City Government 2001-2002 2. Background Information Project location: Tartu, Estonia Launch date: May 3, 2001 Start date of

More information

Landscape of eid in Europe in 2013

Landscape of eid in Europe in 2013 Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

esignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics

esignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics Introduction to the Connecting Europe Facility esignature building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology February

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

TABLE OF CONTENTS. Vendor Web & e-registration...2. Usage of Digital Signature Certificate...3. What is an etoken?. 4. General FAQ...

TABLE OF CONTENTS. Vendor Web & e-registration...2. Usage of Digital Signature Certificate...3. What is an etoken?. 4. General FAQ... TABLE OF CONTENTS Frequently Asked Questions (FAQ) on Vendor Web & e-registration...2 Usage of Digital Signature Certificate...3 What is an etoken?. 4 What is stored in etoken? How to install the etoken

More information

2 2 & 2 3 3 3 4 / / EMD

2 2 & 2 3 3 3 4 / / EMD Contents Website... 2 Live Tenders... 2 Registration & Digital Signatures... 2 Participation in the Tender... 3 Login... 3 Online Request for the Tender... 3 Download Documents... 4 Upload files Technical

More information

Processo civile telematico «on line civil trial»

Processo civile telematico «on line civil trial» Processo civile telematico «on line civil trial» Giulio Borsari IT Officer Department of Judicial Organization, Personnel and Services Civil justice in Italy: huge numbers! 140 tribunals 26 Courts of Appeals

More information

PAdES signatures in itext and the road ahead. Paulo Soares

PAdES signatures in itext and the road ahead. Paulo Soares PAdES signatures in itext and the road ahead Paulo Soares About the speaker Paulo Soares M.Sc. Electronics and Telecomunications Hardware background in military comunication systems Works for www.glintt.com

More information

Introduc)on to STORK2.0 project

Introduc)on to STORK2.0 project Introduc)on to STORK2.0 project AAI Workshop Brussels, April 2014 EUROPEAN EID CONTEXT FOR EGOVERNMENT NaKonal online services today with eid CENTRAL GOVERNMENT ONLINE SERVICES LOCAL GOVERNMENT ONLINE

More information

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST

More information

Some Public Sector Cloud Views

Some Public Sector Cloud Views Some Public Sector Cloud Views Herbert.Leitold@a-sit.at Digital Enterprise Europe, London, June 11 th, 2014 Zentrum für sichere Informationstechnologie - Austria Expectations and Take Up some are high

More information

Digital Signatures. Digital Signatures - How to enable validation of Siemens PKI signatures in Adobe Reader? Issued by: Date 01/2016

Digital Signatures. Digital Signatures - How to enable validation of Siemens PKI signatures in Adobe Reader? Issued by: Date 01/2016 Digital Signatures Digital Signatures - How to enable validation of Siemens PKI signatures in Adobe Reader? Issued by: Company SIEMENS NV/SA Name Digital Signatures Date 01/2016 Author: Siemens File: Validating

More information

Balancing Usability and Security for Medical Devices

Balancing Usability and Security for Medical Devices Balancing Usability and Security for Medical Devices Ken Hoyme Adven&um Labs ken.hoyme@adven8umlabs.com Robert North, LLC bnorth@humancenteredstrategies.com March 17, 2014 3/17/2014 2014 Adven8um Labs

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

Draft Middleware Specification. Version X.X MM/DD/YYYY

Draft Middleware Specification. Version X.X MM/DD/YYYY Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions

More information

Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal

Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise geddis@apple.com 703-264-5103 1 Agenda A View of Apples PKI

More information

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.

More information

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL Wangjian, Xu Guoai, Zhangmiao National Engineering Laboratory for Disaster Backup and Recovery, Beijing University

More information

Sicherheitsaspekte des neuen deutschen Personalausweises

Sicherheitsaspekte des neuen deutschen Personalausweises Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking

More information

CS 5150 So(ware Engineering Evalua4on and User Tes4ng

CS 5150 So(ware Engineering Evalua4on and User Tes4ng Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering Evalua4on and User Tes4ng William Y. Arms Usability: The Analyze/Design/Build/Evaluate Loop Analyze requirements Design User

More information

Main Research Gaps in Cyber Security

Main Research Gaps in Cyber Security Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis

More information

Developing a Full- Spectrum Security Training Program

Developing a Full- Spectrum Security Training Program Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our

More information

IAS2. ets Market analysis

IAS2. ets Market analysis IAS2 Study to support the implementation of a pan-european framework on electronic identification and trust services for electronic transactions in the internal market SMART 2012/0001 ets Market analysis

More information

CERTIFICATE REVIEW RECORD

CERTIFICATE REVIEW RECORD REVIEW HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister of the Prime Minister s Office of

More information

Certificate Path Validation

Certificate Path Validation Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security

More information

DS-05-2015: Trust eservices. The policy context: eidas Regulation

DS-05-2015: Trust eservices. The policy context: eidas Regulation DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task

More information

Finger Vein digital biometric signature: use cases

Finger Vein digital biometric signature: use cases Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric

More information

Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market COM(2012)238 of 4.6.2012 ClubPSCo, Paris, 20.6.2012 Gérard GALLER

More information

Long-term archiving of electronically signed documents in Hungary

Long-term archiving of electronically signed documents in Hungary Long-term archiving of electronically signed documents in Hungary Dr. István Zsolt BERTA, PhD, MBA, CISA Microsec Ltd. HUNGARY istvan.berta@microsec.hu www.e-szigno.hu http://www.e-szigno.hu Microsec Ltd.

More information

Smart Card APDU Analysis

Smart Card APDU Analysis Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler ivan.buetler@csnc.ch Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil

More information

Implementation of Digital Signature Solution

Implementation of Digital Signature Solution Implementation of Digital Signature Solution Nuno Filipe Jorge Guedes Extended Abstract April, 2008 1. Introduction The scope of this study points to security area and has its own focus on digital signatures

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

ANKING AND USINESS SOLUTIONS (BBS) Bjørn Søland

ANKING AND USINESS SOLUTIONS (BBS) Bjørn Søland ANKING AND USINESS SOLUTIONS (BBS) Bjørn Søland BBS A knowledge-based IT-company 700 employees Total turnover: 183 Mill Owned by banks Subsidiary companies BBS AB, LD Betalingssystemer AS, ZebSign AS Ownership

More information

Fact sheet: sa Certipost nv. Certipost Panel Presentation European Commission. Company. Activities based on 2 pillars: Clients.

Fact sheet: sa Certipost nv. Certipost Panel Presentation European Commission. Company. Activities based on 2 pillars: Clients. Certipost Panel Presentation European Commission Bart Callens Product and Sales Manager Document Protection Services 1 Fact sheet: sa Certipost nv Company Shareholders De Post/La Poste, 50% Belgacom, 50%

More information

Project Management Introduc1on

Project Management Introduc1on Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?

More information

Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward.

Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward. Capacity Building Workshop on Cross-border Paperless Trade Facilitation: Lessons from Ongoing Initiatives and Way Forward. Enabling cross-border paperless trade data exchange findings from regional studies

More information

Scoping Cross-Border e-id Management and Facilitating International e-trade

Scoping Cross-Border e-id Management and Facilitating International e-trade Scoping Cross-Border e-id Management and Facilitating International e-trade Prof. dr. HONG XUE Director of Beijing Normal University Institute for Internet Policy & Law UNCITRAL Colloquium on Identity

More information

BDOC FORMAT FOR DIGITAL SIGNATURES

BDOC FORMAT FOR DIGITAL SIGNATURES :2013 BDOC FORMAT FOR DIGITAL SIGNATURES Version 2.1:2013 OID: 1.3.6.1.4.1.10015.1000.3.2.1 Table of Contents INTRODUCTION... 2 1. SCOPE... 3 2. REFERENCES... 4 3. DEFINITIONS AND ABBREVIATIONS... 5 4.

More information

The Costs of Managed PKI:

The Costs of Managed PKI: The Costs of Managed PKI: In-House Implementation of PKI vs. Traditional Managed PKI vs. ON-Demand PKI A TC TrustCenter Whitepaper Last Updated: February 2008 Introduction Until recently, organizations

More information

Incorporating Digital Signing & Encryption in Transactions in the Payment System of Sri Lanka

Incorporating Digital Signing & Encryption in Transactions in the Payment System of Sri Lanka Incorporating Digital Signing & Encryption in Transactions in the Payment System of Sri Lanka Presentation by Sunimal Weerasooriya, CEO LankaClear (Pvt) Ltd. Introduction to LankaClear Originated as Sri

More information

Open Source Enterprise Application - uengine

Open Source Enterprise Application - uengine Open Source Enterprise Application - uengine The universal engine for e-business www.uengine.org Jinyoung Jang The North East Asia OSS Promotion Forum Sep/2007 Contents History Main Product Business Process

More information

High-Performance Qualified Digital Signatures for X-Road

High-Performance Qualified Digital Signatures for X-Road High-Performance Qualified Digital Signatures for X-Road Arne Ansper 1,2, Ahto Buldas 1,2, Margus Freudenthal 1, Jan Willemson 1 1 Cybernetica AS, Mäealuse 2/1, Tallinn, Estonia 2 ELIKO Competence Centre

More information

GLOBAL TO LOCAL / LOCAL TO GLOBAL PSS IMPLEMENTATION @ REGIONAL AND COUNTRY LEVEL: LESSONS FOR BROADER HEALTH PROMOTION

GLOBAL TO LOCAL / LOCAL TO GLOBAL PSS IMPLEMENTATION @ REGIONAL AND COUNTRY LEVEL: LESSONS FOR BROADER HEALTH PROMOTION GLOBAL TO LOCAL / LOCAL TO GLOBAL PSS IMPLEMENTATION @ REGIONAL AND COUNTRY LEVEL: LESSONS FOR BROADER HEALTH PROMOTION Presenta?on by Dr. Stefan Germann World Vision Interna?onal, REPSSI Board of Directors

More information

Norway Post s Electronic ID Case study on authentication. Oslo 17. June 1999 Terje Kolnes, Norway Post

Norway Post s Electronic ID Case study on authentication. Oslo 17. June 1999 Terje Kolnes, Norway Post Norway Post s Electronic ID Case study on authentication Oslo 17. June 1999 Terje Kolnes, Norway Post.0 Presentation Objective The Norway Post National electronic ID, The enabler for e-commerce Global

More information

Specifying the content and formal specifications of document formats for QES

Specifying the content and formal specifications of document formats for QES NATIONAL SECURITY AUTHORITY Version 1.0 Specifying the content and formal specifications of document formats for QES 24 July 2007 No.: 3198/2007/IBEP-013 NSA Page 1/14 This English version of the Slovak

More information

Department of Defense SHA-256 Migration Overview

Department of Defense SHA-256 Migration Overview Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto

More information

Stefan Santesson Consultant, 3xA Security AB (http://aaa-sec.com) Born November 2, 1962 in Malmö, Sweden

Stefan Santesson Consultant, 3xA Security AB (http://aaa-sec.com) Born November 2, 1962 in Malmö, Sweden CV Stefan Santesson Consultant, 3xA Security AB (http://aaa-sec.com) Born November 2, 1962 in Malmö, Sweden Björnstorp 744 240 13 Genarp Sweden sts@aaa-sec.com Tel +46-767 861337 Skype: Razumain COMPETENCE

More information

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation

More information

The Belgian e-id: hacker vs developer

The Belgian e-id: hacker vs developer OWASP Belgium Chapter The OWASP Foundation http://www.owasp.org The Belgian e-id: hacker vs developer Erwin Geirnaert ZION SECURITY Frank Cornelis Fedict Agenda The OWASP Foundation http://www.owasp.org

More information

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication

More information