Record Integrity and Authentication for Electronic R&D
|
|
|
- Adelia York
- 10 years ago
- Views:
Transcription
1 Record Integrity and Authentication for Electronic R&D Author: Michael H Elliott Note: The following is a summary of a comprehensive analysis on electronic record integrity and authentication contained in the publication Electronic Laboratory Notebooks: A Foundation for Scientific Knowledge Management Edition III. Further information can be obtained at A patent provides rights to an inventor to restrict the ability of others to make, use, or sell an invention. In the scientific domains, laboratory notebooks are typically used as the primary evidence to prove inventorship of a concept and the details of its first successful use, or what is known as reduction to practice. The particulars of the research and associated dates and times are especially critical to establishing proprietary rights in the United States. The reason for this is that the U.S., versus other countries, awards patents on a first-inventor basis rather than on a first-to-file. This puts the responsibility in the hand of the inventor to have accurate and corroborated records to prove they created and successfully demonstrated the innovation before others. Being so critically relied upon, entries in a laboratory notebook must be clear to demonstrate how and when the work was performed, signed by the author, and corroborated by a witness not involved with the original work. The use of Electronic Laboratory Notebook ( ELN ) technology has risen sharply in the past four years, having now penetrated over 20% of all biopharmaceutical companies. i ELN has not only led to increased laboratory efficiency and improved leverage of institutional knowledge, but also to enhanced protection of Intellectual Property ( IP ). Based on technology to manage the underlying electronic records, ELN can provide the access security, version control, record authentication, and automated time stamping their paper forbearers cannot. In December 2006, the risk of ignoring the proper management of patent-supporting electronic records changed appreciably with amendments to the United States Federal Rules of Civil Procedure ( FRCP ). The FRCP changes alter the procedures of discovery, which is the process of requesting, or compelling, information from one party to another in a civil case. Since 97% of scientific records have their basis in electronic form, these changes effectively make all discovery now electronic discovery or e-discovery. This has wide-ranging implications which affects the retention of research data, IP records management practices, organization of data, and data storage formats. To ensure the trustworthiness of electronic records, effective management controls must be in place to guarantee their timing, integrity, and authenticity. One must not only secure data against theft or alteration, but be able to prove when the record was created, who created it, who approved/signed it, detection of any changes, and an auditable trail of the record s lifecycle. An organization must have consistent, audited, and proven record management practices that are enforced across the entire spectrum of their research operations. The effective management and control of e-records is also important to assure their admission into a court proceeding. The records must pass a series of criteria to be classified as business records under the Federal Rules of Evidence. Not only do they have to be maintained under the normal course of the business, but they must be proven to be authentic to avoid being classified as hearsay. The US Federal Judicial Center s Manual for Complex Litigation ii notes that a judge should consider the accuracy of computerized evidence and a proponent of computerized evidence has the burden of laying a proper foundation by establishing its accuracy. In the case In Re Vee Vinhnee iii the appellate court affirmed the lower 2007 Atrium Research & Consulting Page 1 of 8
2 court s denial of electronic records admission noting that the focus is not on the circumstances of the creation of the record, but rather on the circumstances of the preservation of the record during the time it is in the file so as to assure that the document being proffered is the same as the document that was originally created. No longer can companies continue to permit scientists and technicians to arbitrarily manage records in an uncontrolled manner. PKI digital signature and X9.95 timestamp technologies have come on the market in the last few years to help organizations minimize their risk exposures. In the following sections we will discuss these and other technologies employed for authentication. Record Authentication Technology There are a number of different technologies used to establish the authenticity of records and users. There are electronic signatures, timestamps, hash digests, checksums, cyclic redundancy checks, and so forth. What technology is used and how it is deployed is dependent on the need of the particular user and the environment. In the scientific domains for patent protection and/regulatory compliance, electronic records must have the support of technology to prove that they are what they purport to be, any changes have been detected and logged, detection of corruption in transmission, and that they have a valid creator, sender, and receiver. Particularly with patents, the attestation of the time and date of the record s creation is crucial. In Re Scott T. Jolley, iv a patent was upheld principally on the basis of an timestamp. A digital signature is cryptographic process used to assure message originator authenticity, integrity, and nonrepudiation. v Often confused with the broader electronic signatures, digital signatures adhere to the principle of nonrepudiation, which means there is no way for a person to deny that they created a record, they sent it, or they received it. The concept of a hash function needs to be explained as this process is used natively and in combination with other signature processes. Cryptographic hash functions create an identifier based on the digestion of a record. Since this hash value is based on the contents of the record processed, it is unique. If the record content changes, the re-hashing of the record will result in a new value. The hash value is also known as a digital fingerprint due to this uniqueness. Figure 1 Hashing creates a unique fingerprint for a file There are many hash algorithms that have been used over the years such as MD5, RIPEMD-160, and SHA-1. RIPEMD- 160 is most popular in Europe, while SHA-1 and SHA-2 are commonly used in the U.S. Another important concept is encryption. Encryption is a cryptographic technique for obscuring a record to make it unreadable without special tools or knowledge to decrypt it. A cipher is used for the encryption and decryption process and in many cases a key is used to modify the cipher algorithm. Having the correct key, or piece of code, will allow the algorithm to function properly. The analogy is a door lockset the cipher is the lock itself, while the key either allows or restricts the ability for the door to open Atrium Research & Consulting Page 2 of 8
3 In symmetric encryption, or secret key cryptography, the same key is used for encrypting and decrypting the record. In other words, you hand the key over to the person on the other side of the door to unlock it. In asymmetric encryption, or public-key cryptography, different keys are used. In the case of a digital signature, a private key is used to encrypt the file and a public key is used to decrypt it. These keys adhere to the concept of non-repudiation; each key cannot undo its own particular function. Once a file is encrypted, the private key cannot unlock it. In the door analogy, your key to lock the door is different than another s key on the other side used to unlock it. Public Key Infrastructure The Public Key Infrastructure ( PKI ) X.509 standard uses digital signatures based on asymmetric encryption. The goals of PKI are to create a trusted relationship between one party and another to authenticate the parties, guarantee the integrity of a data transmission, and to ensure data privacy. PKI utilizes the concept of digital certificates which are a form of credit card or passport which identifies certain characteristics of the sender. These certificates act as a form of guarantee to prove the authenticity of the sender. A user s (or subject data) identity is matched to a public key and the details about the encryption algorithm are contained in the certificate. These are issued by a Certificate Authority ( CA ) which verifies the identity of user and include the digital signature and other information of the authorizing agent. Just like a credit card, these certificates have a specified period of validity and can be revoked. The exact implementation of PKI is a bit unique to the specific provider of the technology. Though very robust and well established in the market, the use of PKI is not without its challenges. The infrastructure to support public key cryptography can be quite daunting for small or medium size organizations. Not only do the costs of the technology have to be considered, but the policies, procedures, and administration have to be taken into account for the total cost of ownership. It s a matter of risk analysis and a balance between costs and the potential exposure to your data. Certificates by definition have a limited life; if they didn t, they wouldn t be very useful. A significant advantage of the technology is that certificates are revoked if someone leaves the company, loses their private key, or misuses the system. As shown below, during the period of validity, a user who signed a document, like an ELN page, can be easily verified. But after they are revoked or expire, the certificate authority cannot truly verify the user. Figure 2: PKI certificates have a defined lifespan Figure 3 shows a how a PDF treats an expired certificate. In the second line you will note the comment Signer s Identity is unknown because it has expired or is not yet valid Atrium Research & Consulting Page 3 of 8
4 Figure 3: Signature properties from Acrobat for a PDF with an expired certificate for a signer Over time, algorithms can be compromised, just like the MD5 vi and SHA-1 vii hash algorithms have been. According to Landon Curt Noll of SystemsExperts Corporation, By far, the services that are most vulnerable to the recent attacks (on MD5 & SHA1) are digital signatures and related document authenticity signatures. It is also possible, in the absence of adequate security management practices, that private keys could be lost or stolen and their passwords hacked. CAs could be tampered with, either via an internal or external hack, creating false certificates. Without the use of a trusted time authority, dates and times of records could be back dated without anyone s knowledge. Signatures and Authentication For Everyone ( SAFE ) An exciting development for digital signature standardization is the Signatures and Authentication For Everyone initiative, or SAFE. SAFE endeavors to streamline digital authentication and rights management primarily in the biopharmaceutical industry. Faced with a complex matrix of overlapping and potentially conflicting digital signature products, SAFE unifies authentication for system sign-on and record digital signature. SAFE is PKI-based, compatible with the X.509 standard. SAFE accredits selected PKI Certificate Authorities that meet the established SAFE standard for credential services. In this manner, CAs can exist behind the firewall of an organization or be hosted by a third party. Any accredited organization using a certified authority can establish secure data transmittal with another using a Safe Bridge Certificate Authority ( SBCA ). SAFE requires the use of a hardware identity device such as a Smart card or USB token for a private key linked to a specific individual. Though extremely beneficial to the industry, the SAFE standard does not relinquish the requirements for sound electronic record management practices. SAFE primarily provides an infrastructure for the authentication of identities. It can also be used, via PKI and its digital fingerprint, to determine if a file has been altered once it has been signed. However, for intellectual property protection, records must be proven to be trustworthy and authentic from point of creation. As noted earlier, certificates also expire over time, making it difficult to properly identify the signatory after certificate expiration. Time Authentication The time of record birth may be crucial in the defense of a patent, particularly in the U.S. The concern with PKI is that the date/time synchronization of the Certificate Authority is by policy only. In reality, there is nothing in PKI to prevent backdating of server time. There is no requirement a PKI enabled application must also get its timestamp from a trusted source. The application could, in theory, get the time of record creation from the client clock which could be capriciously set by a user. RFC 3161 The Internet Engineering Task Force ( IETF ) proposed RFC 3161 Internet X.509 Public Key Infrastructure Time-Stamp Protocol ( TSP ) standard was created to resolve the conflicting methods of time attestation used in digital signatures. An 2007 Atrium Research & Consulting Page 4 of 8
5 expansion to the X.509 PKI standard, RFC 3161 specifies the use of a Time Stamp Authority ( TSA ) and timestamps. A TSA is a trusted third party or an internal time source synchronized with a trusted time source that provides timestamp tokens, which are generated via a message and hashed time combination. This creates non-repudiable evidence that a record existed before the time of the token creation. The token is then appended to an X.509 digital signature. This process provides a timestamp near the time of the signature but not a non-repudiable date of creation for the actual record itself. The date of invention is therefore based on some arbitrary date when the record was signed, not the true date of when the work was performed. Other records which might support IP (e.g., mass spectrum, chromatography, gene sequences, e- mails, etc.) often do not undergo a signature process in non-gxp regulated laboratories. These records, which can fall under the changes in FRCP and the Federal Rules of Evidence, may have to be produced in court. If these are being managed randomly or differently than your ELN records, this can raise doubts about your overall level of data management integrity to a judge or jury. Considering that the In Re Jolley turned on an to prove the date of invention, it is not a simple matter of only notebook pages requiring accurate and authenticated dates and times. X9.95 Acknowledging the limitations in X.509, the financial services industry - which is highly dependent on recording time - has specified the X9.95 Trusted Timestamp standard under the governance of the American National Standards Institute ( ANSI ). X9.95 was built upon RFC 3161 and the International Standards Organization ( ISO ) time stamp standards. It differs from RFC 3161 in that it is independent from a public key infrastructure, leading to increase portability of the timestamp. In documents describing the standard, ANSI says in reference to PKI: neither the symmetric nor the asymmetric cryptographic mechanisms described provide timeliness. The timing of the data generating events, such as the generation of the digital data or the generation of the digital signature itself, cannot be verified. If a timestamp is included as part of the digital data, some evidence is provided as to when the data generating event occurred. If, however, the clock used to generate the timestamp is under the control of the data event generator, the timestamp and therefore its timeliness is easily subject to manipulation and is therefore suspect. Only a timestamp token can provide timeliness that is verifiable and provable to a third party. viii X9.95 defines the complete package of management practices, policies, responsibilities, and technical requirements for timestamp non-repudiation and authenticity. The X9.95 process is shown To validate if a record or time value have been altered, the process is reversed. First, the timestamp token is split into the hash digest and time value. Next, the record is hashed, creating another hash value. This value is compared to the hash from the timestamp token. If they compare favorably, the record has not been tampered with. If they do not, the record is considered altered and invalid. Figure 4. First, a hash digest of the electronic record is created using algorithms like RIPEMD-160 or SHA-2. This fingerprint is sent to the Time Stamp Authority. The TSA generates a time value for the hash digest and cryptographically binds the time value and the hash together creating a timestamp token. This is sent back to the originator and linked to the original record. This process can be used to create timestamp tokens for any records in an intellectual property hierarchy, like spreadsheets, s, instrument data files, or other records which are not digitally signed. One of the challenges of this method, though, is to keep up to date with the progression of hash standards and to maintain backward compatibility. To validate if a record or time value have been altered, the process is reversed. First, the timestamp token is split into the hash digest and time value. Next, the record is hashed, creating another hash value. This value is compared to the hash 2007 Atrium Research & Consulting Page 5 of 8
6 from the timestamp token. If they compare favorably, the record has not been tampered with. If they do not, the record is considered altered and invalid. Figure 4: Basic time stamping process However, Stuart Haber and Wakefield Scott Stornetta proved the vulnerability of the basic time stamping process. They noted that if the TSA deceptively modified the time of a particular token, the change would go undetected. ix One of the approaches used to address traceability of tokens is the linked token method. This is where the hash digest from the requestor is linked to all those generated in the past at the TSA. A summary hash which is the digest of all hashes up to that point, is hashed with the message digest, creating a new summary value. As shown below, this process repeats infinitum. The advantage of this approach is traceability, as it creates a non-repudiable chain of all values to date. If any of the underlying hash values changes in anyway, the summary hash to whatever point in time is selected would not match. This summary hash is stored with, or in, each timestamp token. Figure 5: Linked token method The linked token method is built from the concept of Merkle Trees. In a Merkle, or Hash Tree, hash pairs are hashed; those resulting hashes are paired up and hashed; and this process continues up a tree ultimately resulting in a single root hash value. If any of the underlying files or hash values change or their sequence is altered - the root hash would be different than the one previously generated. This root hash is generally published on a regular basis in a public space like a newspaper Atrium Research & Consulting Page 6 of 8
7 Surety LLC The X9.95 and ISO compliant third-party timestamp service company that has been most active in the space of intellectual property protection and ELN for the past several years has been Surety LLC based out of Herndon, Virginia. IP.com, a third party provider of IP search, verification, and storage solutions uses the Surety AbsoluteProof technology for trusted time-stamping and notarization. ELN suppliers EKM, KineMatik, redesignlive, and Symyx as well as several electronic content management and active archive vendors have integrated with the Surety process; they either OEM this service into their application or provide it as an option to their customers. Surety utilizes both the concept of linked tokens and Merkle Trees for non-repudiation. Different from basic timestamp authorities, Surety stores each record hash value, the timestamp token, and summary hash value into what they call the Universal Registry which is a database located at the company. Illustrated in Figure 6, a requestor (e.g., an ELN, SDMS, or LIMS) sends a hash digital fingerprint to the TSA. Just like any other TSA, the time value is cryptographically bound to the hash digest, creating the timestamp token. However, Surety also performs hash chain linking, creating a new summary value and storing it in the token. The summary hash from the linking and the hash values that made up the tree are included in the timestamp token, creating what Surety calls an Integrity Seal ( Seal ). Weekly, the summary hash value is published in the public or commercial notices section of the New York Times, providing the opportunity for an independent audit of the Universal Registry s integrity. Since all the original and summary values are stored, the root can be reconstructed upon demand. If the reconstruction of the tree root matches the value published in the Times, then the integrity of the TSA is undeniable, addressing the anxieties of Haber and Stornetta. Figure 6: Surety notary process Surety offers a freely available program to verify the integrity of a token. To verify, the requestor sends the token (a.k.a. Seal ) back to the TSA (a.k.a. Digital Notary Server ). On the Surety side, the server re-computes the root hash value. It then combines the root hash value with the previous hash values in the Seal. The actual value is retrieved from the Universal Registry and compare to the calculated value. If they match, then the file is considered trustworthy Atrium Research & Consulting Page 7 of 8
8 The resistance to collision is the major consideration for hash algorithms. Collision means that the same hash digest can be generated for the same file. Since hackers are continuing in their efforts to crack these algorithms, academic and government agencies are working diligently to test their robustness. Standards groups like NIST recommend the use of newer, stronger algorithms like the more complex SHA-2 over the older SHA-1 because of the lack of collision resistance. To maintain backward compatibility, Surety has patented a process for creating new Integrity Seals as these standards evolve. Upon demand, a user can Renew their timestamp tokens using the new hash method which generates a new digest, summary hash, and root value without affecting the timestamp. Summary In summary, electronic records are increasingly being used in court proceedings throughout the world. The December 2006 changes to the US Federal Rules of Civil Procedure now explicitly address the legal discovery of electronic records. These changes affect all organizations who file patents in the US. Electronic records must also be proven to be authentic and accurate under the Federal Rules of Evidence. Two complementary methods of record authentication are increasingly being used by biopharmaceutical research organizations in conjunction with electronic laboratory notebooks. SAFE is a newer development to standardize PKI X.509 digital signatures throughout the pharmaceutical industry. However, SAFE does not provide long term assurance of the date and time of record creation, nor does it apply broadly to most scientific records which do not go through a digital signature process. The ANSI X9.95 standard is a complementary process to PKI, providing a non-refutable timestamp on any electronic record. In our view, risks are reduced by the proper use and maintenance of both technologies. However, this does not diminish the critical need for organizations to have sound and proven record management policies, record retention procedures, and audited and compliant business practices. As Chief U.S. Magistrate Judge Paul Grimm (US District Court Maryland) wrote in his opinion in Lorraine et al v. Markel American Insurance Company x, Further, although it may be better to be lucky than good, as the saying goes, counsel would be wise not to test their luck unnecessarily. If it is critical to the success of your case to admit into evidence computer stored records, it would be prudent to plan to authenticate the record by the most rigorous standard that may be applied. If less is required, then luck was with you. If you aren t ready to prove the authenticity of your electronic records, you re increasing your risk exposure - daily. NOTE: This material is 2007 Atrium Research & Consulting. This material was licensed with permission. Its use in no way indicates an endorsement of Surety LLC products and/or strategies by Atrium Research. Trademarks are the property of their respective owners. i Elliott, Michael, 2006 Electronic Laboratory Notebook Survey,Atrium Research & Consulting, Wilton CT USA ii Federal Judicial Center, Manual for Complex Litigation Fourth Edition, 2004 Washington D.C. iii In Re Vee Vinhee, 336 B.R. 437 (9 th Cir. BAP 2005) Lexis 2602 iv In Re Scott T. Jolley, 308 F.3d 1317, 64 USPQ.2d (BNA) 1901 (Fed. Cir. Oct. 29, 2002) (Interference Nos and ) v National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, January 1999 (Revision 1) vi Kaminsky, Dan, MD5 to be Considered Harmful Someday, December vii Noll, Landon Curt, SHA1 Cryptographic Hash Update, SystemsExperts Corporation December viii American National Standard for Financial Services Working Draft X , ix Haber, Stuart and Wakefield Scott Stornetta, How to Time Stamp a Digital Document, Journal of Cryptology (2) x Lorraine et al v. Markel American Insurance Company, 1:2006cv01893 (US District Court Maryland 2006) 2007 Atrium Research & Consulting Page 8 of 8
The Rules have Changed
The Rules have Changed The management of electronic research records is more important than ever before Michael H Elliott Published in Scientific Computing May 2007 A patent provides rights to an inventor
Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication
Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Introduction By allowing the exchange of information more
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Adobe PDF for electronic records
White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
When E-Discovery Becomes Evidence
Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
CALIFORNIA SOFTWARE LABS
; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
The Impact of 21 CFR Part 11 on Product Development
The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
Self-Encrypting Hard Disk Drives in the Data Center
Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
Digital Signatures in a PDF
This document describes how digital signatures are represented in a PDF document and what signature-related features the PDF language supports. Adobe Reader and Acrobat have implemented all of PDF s features
ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS
ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
10 Tips for Selecting the Best Digital Signature Solution
10 Tips for Selecting the Best Digital Signature Solution Avoid the Pitfalls when transitioning from paper-based to electronic signatures Sept 2007 1 Introduction As the traditional paper-based world gives
1 Definitions 86-611 001-001.10
NEBRASKA ADMINISTRATIVE CODE NUMERICAL TABLE OF CONTENTS Chapter # Chapter Title Statutory Code Section(s) Authority 1 Definitions 86-611 001-001.10 2 Digital Signatures Must be Created by Acceptable Tech.
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Oracle WebCenter Content
Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: [email protected] Introduction In May 2011, US Data Management (USDM) was
Public Key Encryption and Digital Signature: How do they work?
White Paper Public Key Encryption and Digital Signature: How do they work? Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved. Reproduction of
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or
SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
21 CFR Part 11 Implementation Spectrum ES
21 CFR Part 11 Implementation Spectrum ES INFRARED SPECTROSCOPY T E C H N I C A L N O T E Introduction Compliance with 21 CFR Part 11 is mandatory for pharmaceutical companies and their suppliers to sell
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Certification Practice Statement (ANZ PKI)
Certification Practice Statement March 2009 1. Overview 1.1 What is a Certification Practice Statement? A certification practice statement is a statement of the practices that a Certification Authority
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
Publicly trusted certification authorities (CAs) confirm signers identities and bind their public key to a code signing certificate.
Code Signing Code signing is the process of digitally signing executables and scripts to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since
New York State Electronic Signatures and Records Act
PIANY Doc. No. 31174 New York State Electronic Signatures and Records Act The information contained within this Resource kit was made available by the New York State Department of State Division of Administrative
7 Key Management and PKIs
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.
Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries
White Paper No 01 I December 2010 Implementation of 21 CFR Part 11 in the epmotion Software Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device
The Virginia Electronic Notarization Assurance Standard
The Virginia Electronic Notarization Assurance Standard Published by Secretary of the Commonwealth Richmond, Virginia January 1, 01 Version 1.0 Table of Contents Scope and Intent... 1 Definitions... Article
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
How To Control A Record System
Thermo Scientific Qtegra Intelligent Scientific Data Solution (ISDS) Software for 21 CFR Part 11 Compliant Laboratories Technical Note 43106 Key Words Compliance, Electronic Records, 21 CFR Part 11 Goal
Electronic And Digital Signatures
Electronic And Digital Signatures Summary The advent of e-government and e-services is changing the way we do business. Traditionally, we created records on paper and we authenticated a record by signing
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
PDF Signer User Manual
PDF Signer User Manual Introduction The main function of PDF Signer is to sign PDF documents using X.509 digital certificates. Using this product you can quickly sign multiple PDF files (bulk sign) by
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.
21 CRF 11 Electronic Records and Signatures Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. By Todd Duell What does Title 21 of the Code of Federal
Electronic and Digital Signatures
Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as
Cisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
An Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System. White Paper. By Frank Tontala
Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System White Paper By Frank Tontala Agilent Technologies Software & Informatics Life Sciences & Chemical Analysis Group
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure
Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Understanding E-Signatures: A Beginner s Guide
Understanding E-Signatures: A Beginner s Guide Content Summary 1 Overview 2 Technology / Terminology Electronic signatures have seen significant adoption in the past decade within insurance, lending, government
Streamlining the drug development lifecycle with Adobe LiveCycle enterprise solutions
White paper Streamlining the drug development lifecycle with Adobe LiveCycle enterprise solutions Using intelligent PDF documents to optimize collaboration, data integrity, authentication, and reuse Table
