IDENTITY ANYONE CAN TRUST
|
|
- Julius Oliver
- 7 years ago
- Views:
Transcription
1 IDENTITY ANYONE CAN TRUST
2 TRUST SERVICE PROVIDER SINCE 2002 SK provides full e-authentication and digital signature solutions for even the most demanding private and public services. We work on a level that meets the world's highest security standards.
3 SECURITY IS IN OUR DNA SK is owned by 3 major Scandinavian companies. Trust and convenience is their everyday business.
4 WE PROVIDE A WORLDWIDE SERVICE + We provide reliable scalable e-identity services. + Our PKI-based solutions are trusted by the EU member states. + We offer 24h customer support for all partners in e-identity business. + We offer market implementation plan and support.
5 SK ON TIMELINE : First ideas of ID-card (approved committee) + May, 2000: Government accepts the ID-card launch + March, 2001: SK is established + Jan 28, 2002: First ID-card issued + Oct, 2006: 1,000,000 th card issued : ID-card as an e-ticket in public transport : World s first e-voting in Estonia : First Mobile-ID issued : Mobile-ID as national electronic ID document + Feb 2015: 200,000,000 digital signatures given
6 CORE BUSINESS: CERTIFICATION + National personal identification documents ID-card, Digi-ID, Mobile-ID, residence permit, e- resident s Digi-ID + Certificates for tachograph cards + Organization certificates Digital stamp, SSL server, crypto & customized certificates Biometrics
7 CORE BUSINESS: VALUE ADDED SERVICES + Architecture for digital signatures and documents: Signature standard End-user software Development libraries Web service Portal + Includes real-time validity confirmation of a certificate (OCSP)
8 Promotion ja Market Education E-ID ECOSYSTEM Smartcard reader distribution E-service Provider Validation Authority Software Distribution Support for SP-s Customer Support Software Vendor Suspension Revocation End of suspension Certification Authority Issuer Population Registry Card manufacturing/ personalization
9 SK IS THE KEY OF E-ESTONIA In Estonia alone, our client portfolio makes up to 89% of GDP. Our clients include all banks, telecom operators, education and healthcare institutions and government facilities in Estonia.
10 ESTONIA IS THE ONLY COUNTRY IN THE WORLD, WHERE: + E-identity is state granted + All state elections are also held electronically since Digital signature has even higher legal value than paper signature + More than 400 e-services are using SK s technology in both public and private sector THANKS TO THAT: + More than half of the population are active e-identity users. + Over 5,000,000 digital signatures are given every month. + We receive monthly transactions more than 10 times the population of Estonia. + Usage activity of Mobile-ID is almost twice the usage activity of an ID-card (40 vs 25 transactions per user/month).
11 RAW FACTS 99% of bank transfers are digital 98% of medicines are prescribed electronically 95% of tax declarations are filled in digitally 85% of students, teachers and parents are using a common e- school system 66% of the population participated in the census via Internet in 2011
12 SK AND E-VOTING Voting is organized and led by Electoral Committee, SK is involved as: + Customer support service provider + Validity confirmation service provider + Sharing experts 2005 versus : 1 e-vote per 50 citizens : 1 e-vote per 3 citizens + Votes given from 116 countries
13 MOBILE-ID HAS CHANGED THE ENTIRE PERSPECTIVE OF TRANSACTIONS
14 Mobile-ID is one of THE SECUREST AND MOST CONVENIENT* way of digital authentication. Mobile-ID allows clients to use the high-end security requirement e-services through: + authenticating + signing digitally * According to TNS Emor survey in 2014, 70% of Mobile-ID users in Estonia consider it the most convenient way of doing business digitally.
15 MOBILE-ID TRANSACTION Service Provider The service provider sends the phone number to the TSP Trust Service Provider The TSP checks with the CA if the user has a certificate and that it is valid Certification Authority User is requested to enter their phone number or user name The service provider displays the verification code to the user Authentication Enter Mobile your ID mobile identification successful number process started Verification code: 4325 User accesses a web site of an M- ID participating service provider The TSP sends a verification code to the service provider TSP confirms the identity The TSP sends an identification enquiry to the MNO MNO The user s mobile displays the identification request The user checks the verification code and accepts the identification request The user enters their PIN to authorize the identification request The CA responds with the certificate validity The generated signature is sent to the TSP
16 BENEFITS FOR THE STATE E-ELECTIONS SIGNING DOCUMENTS DIGITALLY APPLYING FOR A DRIVER S LICENSE APPLYING FOR SOCIAL BENEFITS ACCESSING GRADES AND CURRICULA AT SCHOOL & UNIVERSITY FILING TAX RETURNS LEGALLY REGISTER A NEW BUSINESS Mobile-ID For a state, Mobile-ID is the most cost and time efficient way to provide an authentication method to citizens.
17 PROFIT FROM DIGITAL SIGNATURE Calculate your profit here: eturundus.eu/digital-document
18 E-NVIRON-MENTAL PROFIT In Estonia, a stack of paper as high as the Eiffel Tower is saved every month. Imagine the possible global benefit:
19 SECURITY UNCOMPROMISED The security of Mobile-ID has remained uncompromised without a single incident since its launch in Our PKI-based Mobile-ID solution corresponds to the following security crypto algorithms: + ECC + SHA2 Evaluation level: + EAL4+ ANYTHING LESS IS NON-NEGOTIABLE.
20 AUTHENTICATION USING MOBILE-ID
21 DIGITAL SIGNING USING MOBILE-ID
22 BEAUTY OF THE SYSTEM
23 VALUE FOR PUBLIC & PRIVATE SECTOR + Paperless & convenient digital business + Saving resources: people, time, and money by signing digitally + Secure login to information systems/portals + Attracting more investments + Raising the competitivness of the country + Bringing state services closer to citizens + SK has liability insurance and is regularly audited + Our business is recognised with ISO certificate
24 WE APPRECIATE YOUR TIME! Contacts: SK Pärnu mnt 141, Tallinn Phone Web:
eauthentication in Estonia and beyond Tarvi Martens SK
eauthentication in Estonia and beyond Tarvi Martens SK E-stonia? Population: 1.35M Internet usage: 56% Internet banking: 88% Mobile penetration: >100% 1000+ Free Internet Access points PKI penetration:
More informationEmbedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager
Embedding digital signature technology to other systems - Estonian practice Urmo Keskel SK, DigiDoc Product Manager E-stonia? Population: 1.35M Internet usage: 54% Internet banking: 72% Mobile penetration:
More informatione- Estonia - 10 years of experience
e- Estonia - 10 years of experience Lessons learned Jüri Voore, Estonian Cer;fica;on Centre PROJECT MILESTONES o First ideas in 1997 o Law on personal iden;fica;on documents: Feb, 1999 o Digital Signature
More information1. Lifecycle of a certificate
1 1. Lifecycle of a certificate 1. Client generates Signing Request (CSR) in his secure computer or server where application will be used. Now client has two s a CSR (usually with CSR extension but it
More informationX-Road. egovernment interoperability framework
X-Road egovernment interoperability framework Serving e-nation over 10 years Backbone of the Estonian egovernment 12 years of active duty, no downtime Over 2000 connected e-services More than 900 connected
More informationGlobal eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
More informationController of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
More informationDigital Signatures in Reality. Tarvi Martens SK
Digital Signatures in Reality Tarvi Martens SK Free-flowing digital documents Estonia has deployed digitally signed documents which are recognised universally. These are: Perfectly legal For use in arbitrary
More informationPKI Disclosure Statement
Land Registry Version 2.0 23/07/2008 PKI Disclosure Statement 1. Introduction Land Registry has created an e-security platform for its customers to facilitate role-based access, authentication and electronic
More informationHow To Create A Global Signer For The Internet Of Everything
Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the
More informationGENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT
GENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT 1. Definitions 1.1. SK AS Sertifitseerimiskeskus. 1.2. Client adult, natural person with active legal capacity or legal person
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
Electronic Voting Committee General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-0.98 Date: 23 May 2016 Tallinn 2016 Annotation This paper
More informationCERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
More informationView from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST Thibault.devalroger@opentrust.com
More informationSubmitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex
Submitted to the EC on 03/06/2012 COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex e-justice Communication via Online Data Exchange ICT PSP call identifier:
More informationThe Estonian ID Card and Digital Signature Concept
The Estonian ID Card and Digital Signature Concept Principles and Solutions Ver 20030307 Contents Contents...2 Status of the document...3 Introduction...3 Intended audience...3 Current project status...3
More informationesign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
More informationDepartment of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informatione-authentication guidelines for esign- Online Electronic Signature Service
e-authentication guidelines for esign- Online Electronic Signature Service Version 1.0 June 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications
More informationCoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
More informationeid Services as Part of the new German ID Card Ecosystem 27/10/2011
eid Services as Part of the new German ID Card Ecosystem The new German ID Card Features ID CARD New Electronic Features 1. Biometrics Digital photo and (if desired), two electronic fingerprints Only legitimate
More informationRisk Reduction for Electronic Signing of Large Value Business Obligations. Michał Tabor
Risk Reduction for Electronic Signing of Large Value Business Obligations Michał Tabor Trusted Information Consulting Warsaw, 10 October 2013 Project BIO-PKI Biometric techniques and PKI in identity documents
More informatione-estonia Strategic decisions for success
e-estonia Strategic decisions for success e-estonia e-estonia e-estonia e-estonia e-estonia e-estonia Just to remind you. We are a very small country in a cold Nordic neighborhood! e-estonia Just to remind
More informationMicrosoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
More informationEuropean Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
More informationLog Analysis of Estonian Internet Voting 20132015
Log Analysis of Estonian Internet Voting 20132015 Sven Heiberg 1 Arnis Parsovs 23 Jan Willemson 24 1 Smartmatic-Cybernetica Centre of Excellence for Internet Voting 2 Software Technology and Applications
More informationPotential efficiency of digital signatures to Finnish SMEs. Tham Nguyen
Potential efficiency of digital signatures to Finnish SMEs Tham Nguyen Bachelor s Thesis Degree Programme in International Business December 2014 Abstract 07.12.2014 Degree Programme in International Business
More informationMobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
More informationeid Security Frank Cornelis Architect eid fedict 2008. All rights reserved
eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationTransaction Security. Training Academy
Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.
More informationIDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD
IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and
More informationMobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
More informationLand Registry. Version 4.0 10/09/2009. Certificate Policy
Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2
More informationTraining. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
More informationDen Gode Webservice - Security Analysis
Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework
More informationFOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic
FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,
More informationDS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
More informationFrench Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
More informationWhite Paper. Cloud Signing vs. Smartcard Signing
White Paper Cloud Signing vs. Smartcard Signing 1. Introduction 2. What is the Goal? What is driving successful Electronic Commerce and e-government solutions? The answer is simple: useful applications
More informationUser Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
More information2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
More informationsign-me Bundesdruckerei's solution for online signatures using the new German ID card
Basic information: sign-me sign-me Bundesdruckerei's solution for online signatures using the new German ID card What is sign-me? sign-me is a web application from Bundesdruckerei that enables online signatures
More informationMaking Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
More informatione-go G ve v rnme m nt G at G eway w www.turkiye.gov.tr Turkish e-government Gateway 5/21/2015 1
e-government Gateway www.turkiye.gov.tr Turkish e-government Gateway 5/21/2015 1 Instead of looking for information and services on multiple web sites, the e-government Gateway provides a single point
More informationAuthentication Scenarios India. Ramachandran
Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework
More informationEricsson Mobile digital identity
Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity Ericsson
More informationMicrosoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
More informationDriving Safely on Information Highway. April 2006
Driving Safely on Information Highway April 2006 Agenda FIPS 201 and PK enabling Challenges of PK enabling Ways to meet the challenges PKIF Webcullis (demo) TrustEnabler (demo) FIPS 201 unique PK enabling
More informationesign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
More informationEuropean Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
More informationSpanish initiative to encourage the use of eid & esignature technologies in egovernment Services. Ministry of Public Administrations
Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services Ministry of Public Administrations Miguel Álvarez Rodríguez IT Manager Contents 1. The new eid citizen s
More informationServer based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
More informationThe Mobile Phone Signature in edemocracy and egovernment Applications. Gregor.eibl@bka.gv.at
The Mobile Phone Signature in edemocracy and egovernment Applications Gregor.eibl@bka.gv.at Characteristics of the Citizen Card ( 4 Abs. 1 E-GovG) unique identity authenticity Citizen Card = before authenfication:
More informationDesign and Implemenation of a Unified e-id Card for Secure e-voting System (MUSES)
Design and Implemenation of a Unified e-id Card for Secure e-voting System (MUSES) Samuel N. John Email: samuel.john {at} covenantuniversity.edu.ng Charles Kayode Ayo Department of Computer & Information
More informatione-signature as a Service
e-signature as a Service - A Roadmap In Macao Phoebe Ip Macao Post esigntrust Certification Services 您的電子商務伙伴 O seu Parceiro no Comércio Electrónico 17 September, 2012 Hong Kong Agenda Intro of Macao Post
More informationPKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013
2013 PKI Made Easy: Managing Certificates with Dogtag Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 Agenda What is PKI? What is Dogtag? Installing Dogtag Interacting with Dogtag using REST Future
More informationStandardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise geddis@apple.com 703-264-5103 1 Agenda A View of Apples PKI
More informationDefending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
More informationSignature policy for TUPAS Witnessed Signed Document
Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for
More informationAPPLICATION FOR DIGITAL CERTIFICATE
Application ID Number (For Official Use only) APPLICATION FOR DIGITAL CERTIFICATE Instructions: 1. Please fill the form in BLOCK LETTERS ONLY. 2. All fields are mandatory. 3. Present one (1) copy and the
More informationSAFE Digital Signatures in PDF
SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates
More informationBIOMETRIC & MULTIPLE-TECHNNOLOGIES MOBILE SOLUTIONS IN HEALTHCARE. www.sicbiometrics.com
BIOMETRIC & MULTIPLE-TECHNNOLOGIES MOBILE SOLUTIONS IN HEALTHCARE www.sicbiometrics.com S.I.C. Biometrics - Company Facts North American Biometric and Identification solutions developer and manufacturer
More informationBest prac*ces in Cer*fying and Signing PDFs
over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL
More informationDr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
More informationEnd-User Manual. for. e-pramaan: A National e-authentication Service. Submitted to
e-pramaan: A National e-authentication Service End User Manual version 0.1 1 End-User Manual for e-pramaan: A National e-authentication Service Submitted to Department of Electronics & Information Technology
More informationEHR central system advantages and disadvantages, the case of Estonia. Estonian E-health Foundation Raul Mill
EHR central system advantages and disadvantages, the case of Estonia Estonian E-health Foundation Raul Mill Estonia - 45 000 km2 1.29 mlj. inhabitants GDP: Agriculture 2,7% Industry 26,3% Service 74,5%
More informationCODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com
CODE SIGNING Why Developers Need to Digitally Sign Code and Applications +1-888-690-2424 entrust.com Table of contents Why Code Sign? Page 3 What is Code Signing? Page 4 Verifying Code Authenticity Page
More informationDigital Signatures and Interoperability
Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000
More informationIT Security in Banque du Liban
IT Security in Banque du Liban Zeina AOUN Head of Security Division IT Department BANQUE DU LIBAN Workshop on Building Trust and Confidence in Arabic e-services 25-27 May 2010 AGENDA BDL Security Drivers
More informationApple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
More informationDepartment of Defense PKI Use Case/Experiences
UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO dmmitc3@missi.ncsc.mil UNCLASSIFIED//FOR OFFICIAL USE ONLY Current
More informationTRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH. Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia
TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia To be discussed 1. From data accumulation to information
More informationPatient online services in Estonia
Patient online services in Estonia EHTEL 2012 Symposium: Fact not Fiction Katre Karik; Analyst at the SUSTAINS project Kelli Podošvilev, MSc; SUSTAINS Project manager Peeter Ross, MD, PhD; ehealth expert
More informationE-Lock ProSigner vs. In-built Acrobat 6.0 signatures
E-Lock ProSigner vs. In-built Acrobat 6.0 signatures Table of Contents 1 INTRODUCTION... 2 1.1 E-LOCK PROSIGNER WORKS WITH ANY SECURITY FRAMEWORK... 2 1.2 EASY WIZARD BASED SIGNING OPERATION... 2 1.3 BACKWARD
More informationSicherheitsaspekte des neuen deutschen Personalausweises
Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking
More informationAdobe PDF for electronic records
White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating
More informationMobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
More informationPosition Paper European Citizen Card: One Pillar of Interoperable eid Success
Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.
More informationInternet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
More informationHow To Get Smart Cards From Atos
secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through
More informationINFORMATION TECHNOLOGY CERES DEPARTMENT
INFORMATION TECHNOLOGY CERES DEPARTMENT LRA APPLICATION MANUAL Name Date Written by: Technical support 18/10/2010 Revised by: Approved by: DOCUMENT TRACEABILITY Version Date Description Author 1.0 18/10/2010
More informationStudy on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile
Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte
More informationKey Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
More informationSecurity and Security Certificates for OpenADR systems. Background. Content:
Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting
More informationWhat Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
More informationCA-DAY 2014. Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft
CA-DAY 2014 Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft Microsoft s Root Program in 2014 New Technical Requirements Published in November 2013 First
More informationeid/authentication/digital signatures in Denmark
eid/authentication/digital signatures in Denmark 8. July 2008 Nikolas Triantafyllidis / Charlotte Jacoby Special Advisors Centre for Digital Signatures National IT- and Telecom Agency Authentication and
More informationHSM: A Must Have. Applications are everywhere. www.safenet-inc.com. 2006 SafeNet Inc. All rights reserved.
What is an HSM HSM: A Must Have Applications are everywhere HSM: A Must Have Secrecy, Control, Payment, Rights are all attributes of applications Security & Keys are used HSM: A Must Have Keeping Keys
More informationNational Register of Associations. Number 171.443. CIF G-63287510.
Certificate Policy for Secure Server (SSL), Extended Validation (EV) SSL, Electronic Office and Extended Validation (EV) Electronic Office Certificates National Register of Associations. Number 171.443.
More informationL@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
More informationIdentity & Privacy Protection
Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation turissd@orc.com 703 246 8550 CyberSecurity One of the most serious economic
More informationEESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
More informationComSignTrust e-signing Solutions
ComSignTrust e-signing Solutions Agenda Comda group introduction Our e-signing solutions e-idas central signing compliance ComSignTrust's Icon government clients Other success stories 2 ComSignTrust company
More informationPKI - current and future
PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi
More informationService Description. 3SKey. Connectivity
Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More informationELM Manages Identities of 4 Million Government Program Users with. Identity Server
ELM Manages Identities of 4 Million Government Program Users with Identity Server ELM Implements Single Sign-on With WSO2 Identity Server to Streamline Administration, Improve Productivity, and Reduce
More informationReducing fragmentation in a scattered eid marked
Reducing fragmentation in a scattered eid marked Norstella, eid workshop Oslo, 16 th September 2014 Arne Vidar Haug VP Business Development / Co-Founder, Signicat About Signicat Cloud eid / esignature
More information