View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

Size: px
Start display at page:

Download "View from a European Trust Service Provider Server Signing: Return of experience and certification strategy"

Transcription

1 View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, Berlin Thibault de Valroger VP Strategy & Development OPENTRUST Thibault.devalroger@opentrust.com

2 2 words about OPENTRUST OpenTrust : Technology and Service provider in Digital Trust Our mission : Bring trust in the new digital business Offices in Europe, Middle East, and North America 2 Datacenters 120 employees with 40% R&D +200 large account customers in Government, Finance and Industry Creator of the esignature service 25 millions eid secured worldwide 300,000 documents digitally signed and notarized every month 200 millions of transactions secured every month Reseller partners in 20 countries

3 Digital Signature market dynamics Digital signature market benefits from 50% yearly growth rate from 2012 to 2016 (Gartner) Remote transaction Online subscription Paperless SEPA SDD Mandate Paperless Account creation Supplier contract management Customer contract management HR contract management Face to face transaction Contract signing in Point of Sale Contract signing by retailers and distributors (loans, insurance) Contract signing in mobility (insurance, real estate, pharmaceutics, commerce of goods) BtoC BtoB 3

4 Use cases integrated in online selling process or business workflow Signing online instantly at home, at office Online signing associated to phone selling or cross channel / multi-signer process Signing online asynchronously Signing in Point of Sale Cross channel Contracting in mobility Online or offline with asynchronous transaction confirmation 4

5 Signing online instantly Improve transform rate, avoid back-office post-sale costs, be present 24/7 Customer Offerer website 1. Subscription process 2. redirect 2. To be signed contract 3. Signed contract + evidence file 4. Evidence creation & Archiving 5

6 Signing online asynchronously Manage campains, avoid back-office post-sale costs, reduce delays Personal advisor 1. Contract preparation Advisor Back-Office application Customer 2. notification 2. To be signed contract 4. Signed contract + evidence file 3. Consent & signature process 4. Evidence creation & Archiving 6

7 Personal advisor Signing in Point of Sale Improve PoS efficiency, concentrate PoS on selling, avoid back-office postsale costs, keep all digital 1. Contract preparation Advisor Back-Office application 2. Tablet synchronisation 2. To be signed contract 3. Signed contract + evidence file 3. Consent & signature process 4. Evidence creation & Archiving 7

8 Face to face Selling process Contracting in mobility Improve sales rep. efficiency, improve business traceability, keep all digital 2. Synchronisation Back-Office application 1. Consent process (mostly offline ; transaction recorded and sealed) 2. delayed signature process 3. Signed contract + evidence file 3. Evidence creation & Archiving 2. Transaction confirmation (optional but recommended) 8

9 Facing lack of qualified signature in BtoC eid embedding digital signature feature is not always convenient May not exist May not be pluggable on display terminal (tablet) May not be provided with appropriate middleware or signing SW May not benefit from clear liability scheme for business transaction Is anyway relevant (when exists) and easier to use for authentication 9

10 A pragmatic & winning approach Use server signing associated with authentication methods Certify the solution against AdES complemented with evidence management to compensate the reverse of the burden of the proof When transaction are performed in F2F, certify the solution against AdES based on Qualified Certificate to improve trust and interoperability We missionned the European Leader TUV-IT for this certification 10

11 Protect & Sign Certification Protect&Sign Cloud Personal Signing is certified as Advanced Signature for 2 respective use cases : Remote : the signatory is signing a document without physical presence of a RA representative, he / she is authenticated by remote method (SMS, OTP, shared secret, ) Avanced LCP certification (ETSI TS ) Face to face : the signatory is signing a document with physical presence of a RA representative, the RA representative verifies ID of the signatory face to face against official ID document. Transaction is confirmed by a 2 factors authentication method QCP without SSCD certification (ETSI TS ) 11

12 Protect & Sign Certification 12

13 Protect & Sign Evidence Management Every transaction is associated to an «evidence file» that contains all the elements to prove the validity of the signature in case of legal proceeding Consent protocole (legal mentions, check boxes, refuse / accept buttons, ) that can be «replayed» during legal proceeding or audit Authentication protocole (cellphone number + OTP SMS sent code for instance) To be signed document and Signed document as seen by the signatory (WYSIWYS) The evidence file is timestamped and signed by OPENTRUST as Trusted third Party The signed evidence file is archived for 3 to 10 years (or more) 13

14 Protect & Sign Principles vs EU Directive Protect & Sign principles for Advanced Signature level within EU Directive : (a) Signature creation data is uniquely linked to the signatory; Protect&Sign delivers to end-user a short time digital with a dedicated and unique Key pair (within a secure Hardware Security Module) for each end-user (b) Signature verification data is capable of identifying the signatory; Protect&Sign delivers to end-user a short time digital certificate at his / her name (c) Signature is created using means that the signatory can maintain under his sole control End-user Key pair and certificate is generated only after authentication of end-user, inside a certified HSM, and is destroyed just after the transaction. Nobody can reuse the private key for another transaction Authentication procedure is registered within the evidence file associated to the transaction (d) it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable; Document is digitally signed by offerer (not modifiable) and displayed to end-user in a WYSIWYS (What You See Is What You Sign) way prior to be signed by end-user Document with both digital signatures is timestamped and archived for 10 years inside the «evidence file»

15 Authentication Strategy Protect & Sign activates personal remote signing key with authentication method Vocal record Biometric Signature pad small / large size SMS OTP CAP EMV OTP Token EID with reader ID upload / scan / verification Evidence management User private signing key Archiving

16 Authentication Strategy Signing online instantly at home, at office Signing online asynchronously OTP token SMS OTP Login password eid with smart reader CAP EMV Vocal recording Upload of proving document Signing in Point of Sale eid with tablet reader Biometric Sig. pad ID check & scan ID capture SMS OTP (transaction confirmation) Contracting in mobility 16

17 Shared Responsibility Model managed by the TSP Contract offerer responsibilities: Create the To Be Signed document Identify (First name, surname, etc) and associate authentication method to the end user. Inform the end-user about terms & conditions OPENTRUST (Certification Authority and Evidence Management Authority) responsibilities: Check integrity and authenticity of the To Be Signed document Ensure WYSIWYS Authenticate the end-user to enforce sole-control of private key Obtain consent of the end-user and generate its digital signature creation data (that remains under its sole control) Destroy digital signature creation data after signature of the document Generate evidence file of the transaction Archive and retrieve in real time for 3-10 years (optional) 17

18 Conclusion Successful approach => volume of transactions is growing by 17% monthly Compliance is key to risk management => customers are ready to pay more for certified solutions if they bring them better legal protection Next steps : EU Regulation will enable qualified signature with server signing under an evolution of the certification scheme (2015) 18

19 Questions? Thibault de Valroger VP Strategy & Development OPENTRUST

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1 Zentrum für sichere Informationstechnologie Austria Secure Information Technology Center Austria A-1030 Wien, Seidlgasse 22 / 9 Tel.: (+43 1) 503 19 63 0 Fax: (+43 1) 503 19 63 66 A-8010 Graz, Inffeldgasse

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Telecommunications, Information, Media & Electronics. Digital Signatures. Paving the Way to a Digital Europe

Telecommunications, Information, Media & Electronics. Digital Signatures. Paving the Way to a Digital Europe Telecommunications, Information, Media & Electronics Digital Signatures Paving the Way to a Digital Europe Content Introduction 3 Digital Signatures Authenticity and Integrity of Data Provides a High Level

More information

Best prac*ces in Cer*fying and Signing PDFs

Best prac*ces in Cer*fying and Signing PDFs over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL

More information

Finger Vein digital biometric signature: use cases

Finger Vein digital biometric signature: use cases Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric

More information

Secured Signing for Documents

Secured Signing for Documents Signing Documents in the Cloud Moving Local Government Forward ALGIM 2011 Annual Conference Mike Eyal TME Consulting Ltd, MD Current Signing Process Agenda Why Sign Documents Online? DS Solutions for Local

More information

Understanding E-Signatures: A Beginner s Guide

Understanding E-Signatures: A Beginner s Guide Understanding E-Signatures: A Beginner s Guide Content Summary 1 Overview 2 Technology / Terminology Electronic signatures have seen significant adoption in the past decade within insurance, lending, government

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku

Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku Biometric Electronic Signaturein a Bank Biometryczny podpis elektroniczny w kontekście banku Agenda 1. Biometric e-signature: what is it? 2. Possible Biometric Signature Applications 3. Biometric Electronic

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

2 business days from the date of K-Cyber Invest registration.

2 business days from the date of K-Cyber Invest registration. How to apply K-Cyber Invest How to apply for K-Cyber Invest There are 2 following ways to apply for K-Cyber Invest; 1. Online registration via K-Cyber Service without any documents (For user who had K-Cyber

More information

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08

Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation

More information

Encryption-based 2FA for Server-side Qualified Signature Creation

Encryption-based 2FA for Server-side Qualified Signature Creation S C I E N C E P A S S I O N T E C H N O L O G Y Encryption-based 2FA for Server-side Qualified Signature Creation Christof Rath, christof.rath@iaik.tugraz.at Institute for Applied Information Processing

More information

BoardNox. Secure file sharing solution for Executive Committees and Boards of Directors. www.oodrive.com

BoardNox. Secure file sharing solution for Executive Committees and Boards of Directors. www.oodrive.com BoardNox Secure file sharing solution for Executive Committees and Boards of Directors www.oodrive.com BoardNox Organize meetings (dates, participants, speakers, venues and subjects) Share documents on

More information

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012 Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA

More information

e-authentication guidelines for esign- Online Electronic Signature Service

e-authentication guidelines for esign- Online Electronic Signature Service e-authentication guidelines for esign- Online Electronic Signature Service Version 1.0 June 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications

More information

SIGNATURES ON THE WEBÕS DOTTED LINE: ELECTRONIC SIGNATURES ON CREDIT APPLICATIONS AND GUARANTEES SOON VALID IN ALL STATES.

SIGNATURES ON THE WEBÕS DOTTED LINE: ELECTRONIC SIGNATURES ON CREDIT APPLICATIONS AND GUARANTEES SOON VALID IN ALL STATES. THE ELECTRONIC CREDIT DEPARTMENT SIGNATURES ON THE WEBÕS DOTTED LINE: ELECTRONIC SIGNATURES ON CREDIT APPLICATIONS AND GUARANTEES SOON VALID IN ALL STATES Scott Blakeley 1 The Internet is revolutionizing

More information

ELECTRONIC SIGNATURES AT BANK REPUBLIC SEARCHING THE ORIGINAL COPY OF ELECTRONICALLY SIGNED DOCUMENT CARE FOR THE ENVIRONMENT

ELECTRONIC SIGNATURES AT BANK REPUBLIC SEARCHING THE ORIGINAL COPY OF ELECTRONICALLY SIGNED DOCUMENT CARE FOR THE ENVIRONMENT AT BANK REPUBLIC CARE FOR THE ENVIRONMENT BANK REPUBLIC CUSTOMERS HAVE A UNIQUE OPPORTUNITY IN THE BANKING INDUSTRY OF GEORGIA TO SIGN ELECTRONICALLY LOAN AGREEMENTS AT INSTALLMENT LOAN DESKS AND CASH

More information

Mobile multifactor security

Mobile multifactor security Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security A revolution in authentication and digital signing Smartphones will continue to ship in high volumes,

More information

E-Signature Adoption Trends

E-Signature Adoption Trends E-Signature Adoption Trends In Financial Services Michael Laurie, VP Product Strategy & Co-Founder March 14, 2013 Fast Facts 4 of the top 10 banks in North America More than 600,000,000 documents annually.

More information

IRIS Onboarding Platform. Product Overview

IRIS Onboarding Platform. Product Overview IRIS Onboarding Platform Product Overview The Need for a Digitized Onboarding Platform In the current paper-based onboarding process, disparate and self-contained systems work in a non-integrated environment.

More information

How To Create Trust Online

How To Create Trust Online Authors: Niall Burns (Symphonic), Professor Bill Buchanan (Edinburgh Napier University), Cassie Anderson (miicard) Overview There is a growing demand within governments, health sectors, social care, police,

More information

Trusted Third Party Services

Trusted Third Party Services Trusted Third Party Services State of the art legal and technological security in contracting, notification and communications 1. About Logalty 2 Logalty is a Trusted Third Party incorporated in 2005 as

More information

Protection Profiles for TSP cryptographic modules Part 1: Overview

Protection Profiles for TSP cryptographic modules Part 1: Overview Date: 2015-08 prts 419221-1:2015 Protection Profiles for TSP cryptographic modules Part 1: Overview Document type: Technical Specification Document language: E Contents Introduction...3 1 Scope...4 2 References...4

More information

SAFE Digital Signatures in PDF

SAFE Digital Signatures in PDF SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates

More information

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411

The EMV Readiness. Collis America. Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 The EMV Readiness Collis America Guy Berg President, Collis America berg@collisamerica.com +1 651 925 5411 1 Collis Solutions & Markets Finance Consultancy Card Payments SEPA Financial Risk Mgmt Test Tools

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

Protect Identities for people, workstations, mobiles, networks

Protect Identities for people, workstations, mobiles, networks ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication

Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Introduction By allowing the exchange of information more

More information

Electronic Signatures: A New Opportunity for Growth. May 10, 2005

Electronic Signatures: A New Opportunity for Growth. May 10, 2005 Electronic Signatures: A New Opportunity for Growth May 10, 2005 1 Contents Is It Legal? 3 E-Signature Technology 12 Another Industry Example 15 National Association for Variable Annuities Applications

More information

Future directions of the AusCERT Certificate Service

Future directions of the AusCERT Certificate Service Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Secure Signature Creation Devices (SSCDs)

Secure Signature Creation Devices (SSCDs) Secure Signature Creation Devices (SSCDs) from different approaches Dr. István Zsolt BERTA istvan.berta@microsec.hu Microsec Ltd. Requirements for SSCDs Annex III of the e-signature Directive, in plain

More information

Secure file sharing and collaborative working solution

Secure file sharing and collaborative working solution Secure file sharing and collaborative working solution Collaborate efficiently and in real time with nomad collaborators, subsidiaries, customers, service providers or partners. Make your files available

More information

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association Navigating the Identity Landscape Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association SAFE-BioPharma Association Overview An overview of US and EU government

More information

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW

HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION 2 OVERVIEW HOW IT WORKS E-SIGNLIVE 1 INTRODUCTION With e-signlive, Silanis hosted service, you can invite other people to conveniently and securely sign documents over the web. Your documents can be easily signed

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

The Graphosign signature

The Graphosign signature Environment prot SpA Information Technology Graphosign signature with legal validity Saving in time and money Graphosign signature with legal No risks of signature counterfeiting Online and offline operation

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

PostFiles. The file sharing and synchronization solution dedicated to professionals. www.oodrive.com

PostFiles. The file sharing and synchronization solution dedicated to professionals. www.oodrive.com PostFiles The file sharing and synchronization solution dedicated to professionals www.oodrive.com Share all file types, regardless of size or format. Synchronize and read files across several devices.

More information

Certificate Policy for VoIP

Certificate Policy for VoIP Certificate Policy for VoIP October 2002 Stephan Grill grill@a-trust.at Current Situation VoIP Project Security in Telecommunication http://www.ftw.at/projektb4_de.html Two different types of certificates

More information

Vendor Questions. esignatures Request for information InsureSign

Vendor Questions. esignatures Request for information InsureSign InsureSign Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing

More information

White Paper. Cloud Signing vs. Smartcard Signing

White Paper. Cloud Signing vs. Smartcard Signing White Paper Cloud Signing vs. Smartcard Signing 1. Introduction 2. What is the Goal? What is driving successful Electronic Commerce and e-government solutions? The answer is simple: useful applications

More information

Reducing fragmentation in a scattered eid marked

Reducing fragmentation in a scattered eid marked Reducing fragmentation in a scattered eid marked Norstella, eid workshop Oslo, 16 th September 2014 Arne Vidar Haug VP Business Development / Co-Founder, Signicat About Signicat Cloud eid / esignature

More information

Intland s Medical Template

Intland s Medical Template Intland s Medical Template Traceability Browser Risk Management & FMEA Medical Wiki Supports compliance with IEC 62304, FDA Title 21 CFR Part 11, ISO 14971, IEC 60601 and more INTLAND codebeamer ALM is

More information

The Top 3 E-Signature Use Cases:

The Top 3 E-Signature Use Cases: The Top 3 E-Signature Use Cases: What type of e-signature best suits my process? What type of e-signature will best suit my process? There is no one-size-fits-all answer. It all depends on the process

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

Strong data protection. Strategic business value. www.thales-esecurity.com

Strong data protection. Strategic business value. www.thales-esecurity.com Someone is stalking your sensitive data. Coveting your intellectual property. Waiting for the slightest crack in the window of opportunity to hack it, misuse it, and run. How can you best protect and control

More information

Strong Authentication in details

Strong Authentication in details Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Scalable Authentication

Scalable Authentication Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors

More information

How Secure is Authentication?

How Secure is Authentication? FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site

More information

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Project Title Digital Signatures for ClinPhone Organisation concerned ClinPhone

More information

Business Issues in the implementation of Digital signatures

Business Issues in the implementation of Digital signatures Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous

More information

Adobe PDF for electronic records

Adobe PDF for electronic records White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating

More information

The Impact of 21 CFR Part 11 on Product Development

The Impact of 21 CFR Part 11 on Product Development The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical

More information

iii. You will not be able to access their iocbc account without a valid OTP token from 1 Nov 2012 onward.

iii. You will not be able to access their iocbc account without a valid OTP token from 1 Nov 2012 onward. Login using One-Time Password (OTP) i. You can continue to login without the OTP from now till 31 October 2012 so long as you have not activated your token via the iocbc Online platform. ii. Once you have

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW

A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW July 2012 WHITEPAPER BY MARK BAAIJENS, MANAGING CONSULTANT FOR THE PAYMENT COMPETENCE CENTER Author Mark finished his Master of Science degree

More information

How Secure is Authentication?

How Secure is Authentication? U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered

More information

Products. Digital Document for DNA A Single, Browser-based Electronic Content Management System That Reduces Costs and Streamlines Processes

Products. Digital Document for DNA A Single, Browser-based Electronic Content Management System That Reduces Costs and Streamlines Processes Products Digital Document for DNA A Single, Browser-based Electronic Content Management System That Reduces Costs and Streamlines Processes Products Manual, paper-based processing of documents can slow

More information

Senato della Repubblica

Senato della Repubblica The digital signature service of the Italian Senate ECPRD ICT working group 2009, Italian Parliament Carlo Marchetti carlo.marchetti@senato.it Topics of the presentation Use cases System model Design principles

More information

Fact sheet: sa Certipost nv. Certipost Panel Presentation European Commission. Company. Activities based on 2 pillars: Clients.

Fact sheet: sa Certipost nv. Certipost Panel Presentation European Commission. Company. Activities based on 2 pillars: Clients. Certipost Panel Presentation European Commission Bart Callens Product and Sales Manager Document Protection Services 1 Fact sheet: sa Certipost nv Company Shareholders De Post/La Poste, 50% Belgacom, 50%

More information

Security Considerations

Security Considerations Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology (IPT) Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright

More information

DS-05-2015: Trust eservices. The policy context: eidas Regulation

DS-05-2015: Trust eservices. The policy context: eidas Regulation DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task

More information

Automation for Electronic Forms, Documents and Business Records (NA)

Automation for Electronic Forms, Documents and Business Records (NA) Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Business Partner Training Curriculum Sage Evolution Premium Administrator Course (Learning Unit 4)

Business Partner Training Curriculum Sage Evolution Premium Administrator Course (Learning Unit 4) Business Partner Training Curriculum Sage Evolution Premium Course (Learning Unit 4) This comprehensive training course covers the activities that an administrator will perform in a Sage Evolution Premium

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

How To Use The Signamus Cloud Service For Business

How To Use The Signamus Cloud Service For Business Cloud Services Archiving Audit-proof Available anytime, anywhere Compliant with international Directives and Laws www.signamus.com Secure Storage With the Secure Storage you can retain your data securely,

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Questions & Answers. on e-cohesion Policy in European Territorial Cooperation Programmes. (Updated version, May 2013)

Questions & Answers. on e-cohesion Policy in European Territorial Cooperation Programmes. (Updated version, May 2013) Questions & Answers on e-cohesion Policy in European Territorial Cooperation Programmes (Updated version, May 2013) This fact sheet was drafted jointly by INTERACT and European Commission (DG Regional

More information

Electronic Signature Capture with Authentication

Electronic Signature Capture with Authentication Electronic Signature Capture with Authentication The E-Signature Solution Trusted by the World's Leading Banks, Telecom Operators, Insurance Agencies and Many More Using FSN s solutions to fill out electronic

More information

Signature policy for TUPAS Witnessed Signed Document

Signature policy for TUPAS Witnessed Signed Document Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for

More information

VASCO: Compliant Digital Identity Protection for Healthcare

VASCO: Compliant Digital Identity Protection for Healthcare VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are

More information

Online E-Signing. Send and Sign Documents on the Internet Anywhere

Online E-Signing. Send and Sign Documents on the Internet Anywhere Online E-Signing Send and Sign Documents on the Internet Anywhere Maximising the value of digital transformation is important in most industries and critical for survival against competition for some.

More information

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation

More information

Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)

Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA) Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA) Compliance with 21 CFR Part 11 Introduction Part 11 in Title 21 of the Code of Federal

More information

YubiKey Authentication Module Design Guideline

YubiKey Authentication Module Design Guideline YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company

More information

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS

ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,

More information

Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries

Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries White Paper No 01 I December 2010 Implementation of 21 CFR Part 11 in the epmotion Software Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device

More information

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,

More information

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time

More information

TrustedX: eidas Platform

TrustedX: eidas Platform TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,

More information

STANDARDISIERUNG FÜR EIDAS IM MANDATE/460

STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights reserved STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights

More information

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1 QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,

More information

Chip and PIN: two-factor authentication

Chip and PIN: two-factor authentication Chip and PIN: two-factor authentication Chip and PIN: two-factor authentication As online banking fraud continues to grow, consumers deep-seated security fears remain one of the biggest barriers to online

More information