IDENTITY ANYONE CAN TRUST

Size: px
Start display at page:

Download "IDENTITY ANYONE CAN TRUST"

Transcription

1 IDENTITY ANYONE CAN TRUST

2 TRUST SERVICE PROVIDER SINCE 2002 SK provides full e-authentication and digital signature solutions for even the most demanding private and public services. We work on a level that meets the world's highest security standards.

3 SECURITY IS IN OUR DNA SK is owned by 3 major Scandinavian companies. Trust and convenience is their everyday business.

4 WE PROVIDE A WORLDWIDE SERVICE + We provide reliable scalable e-identity services. + Our PKI-based solutions are trusted by the EU member states. + We offer 24h customer support for all partners in e-identity business. + We offer market implementation plan and support.

5 SK ON TIMELINE : First ideas of ID-card (approved committee) + May, 2000: Government accepts the ID-card launch + March, 2001: SK is established + Jan 28, 2002: First ID-card issued + Oct, 2006: 1,000,000 th card issued : ID-card as an e-ticket in public transport : World s first e-voting in Estonia : First Mobile-ID issued : Mobile-ID as national electronic ID document + Feb 2015: 200,000,000 digital signatures given

6 CORE BUSINESS: CERTIFICATION + National personal identification documents ID-card, Digi-ID, Mobile-ID, residence permit, e- resident s Digi-ID + Certificates for tachograph cards + Organization certificates Digital stamp, SSL server, crypto & customized certificates Biometrics

7 CORE BUSINESS: VALUE ADDED SERVICES + Architecture for digital signatures and documents: Signature standard End-user software Development libraries Web service Portal + Includes real-time validity confirmation of a certificate (OCSP)

8 Promotion ja Market Education E-ID ECOSYSTEM Smartcard reader distribution E-service Provider Validation Authority Software Distribution Support for SP-s Customer Support Software Vendor Suspension Revocation End of suspension Certification Authority Issuer Population Registry Card manufacturing/ personalization

9 SK IS THE KEY OF E-ESTONIA In Estonia alone, our client portfolio makes up to 89% of GDP. Our clients include all banks, telecom operators, education and healthcare institutions and government facilities in Estonia.

10 ESTONIA IS THE ONLY COUNTRY IN THE WORLD, WHERE: + E-identity is state granted + All state elections are also held electronically since Digital signature has even higher legal value than paper signature + More than 400 e-services are using SK s technology in both public and private sector THANKS TO THAT: + More than half of the population are active e-identity users. + Over 5,000,000 digital signatures are given every month. + We receive monthly transactions more than 10 times the population of Estonia. + Usage activity of Mobile-ID is almost twice the usage activity of an ID-card (40 vs 25 transactions per user/month).

11 RAW FACTS 99% of bank transfers are digital 98% of medicines are prescribed electronically 95% of tax declarations are filled in digitally 85% of students, teachers and parents are using a common e- school system 66% of the population participated in the census via Internet in 2011

12 SK AND E-VOTING Voting is organized and led by Electoral Committee, SK is involved as: + Customer support service provider + Validity confirmation service provider + Sharing experts 2005 versus : 1 e-vote per 50 citizens : 1 e-vote per 3 citizens + Votes given from 116 countries

13 MOBILE-ID HAS CHANGED THE ENTIRE PERSPECTIVE OF TRANSACTIONS

14 Mobile-ID is one of THE SECUREST AND MOST CONVENIENT* way of digital authentication. Mobile-ID allows clients to use the high-end security requirement e-services through: + authenticating + signing digitally * According to TNS Emor survey in 2014, 70% of Mobile-ID users in Estonia consider it the most convenient way of doing business digitally.

15 MOBILE-ID TRANSACTION Service Provider The service provider sends the phone number to the TSP Trust Service Provider The TSP checks with the CA if the user has a certificate and that it is valid Certification Authority User is requested to enter their phone number or user name The service provider displays the verification code to the user Authentication Enter Mobile your ID mobile identification successful number process started Verification code: 4325 User accesses a web site of an M- ID participating service provider The TSP sends a verification code to the service provider TSP confirms the identity The TSP sends an identification enquiry to the MNO MNO The user s mobile displays the identification request The user checks the verification code and accepts the identification request The user enters their PIN to authorize the identification request The CA responds with the certificate validity The generated signature is sent to the TSP

16 BENEFITS FOR THE STATE E-ELECTIONS SIGNING DOCUMENTS DIGITALLY APPLYING FOR A DRIVER S LICENSE APPLYING FOR SOCIAL BENEFITS ACCESSING GRADES AND CURRICULA AT SCHOOL & UNIVERSITY FILING TAX RETURNS LEGALLY REGISTER A NEW BUSINESS Mobile-ID For a state, Mobile-ID is the most cost and time efficient way to provide an authentication method to citizens.

17 PROFIT FROM DIGITAL SIGNATURE Calculate your profit here: eturundus.eu/digital-document

18 E-NVIRON-MENTAL PROFIT In Estonia, a stack of paper as high as the Eiffel Tower is saved every month. Imagine the possible global benefit:

19 SECURITY UNCOMPROMISED The security of Mobile-ID has remained uncompromised without a single incident since its launch in Our PKI-based Mobile-ID solution corresponds to the following security crypto algorithms: + ECC + SHA2 Evaluation level: + EAL4+ ANYTHING LESS IS NON-NEGOTIABLE.

20 AUTHENTICATION USING MOBILE-ID

21 DIGITAL SIGNING USING MOBILE-ID

22 BEAUTY OF THE SYSTEM

23 VALUE FOR PUBLIC & PRIVATE SECTOR + Paperless & convenient digital business + Saving resources: people, time, and money by signing digitally + Secure login to information systems/portals + Attracting more investments + Raising the competitivness of the country + Bringing state services closer to citizens + SK has liability insurance and is regularly audited + Our business is recognised with ISO certificate

24 WE APPRECIATE YOUR TIME! Contacts: SK Pärnu mnt 141, Tallinn Phone Web:

eauthentication in Estonia and beyond Tarvi Martens SK

eauthentication in Estonia and beyond Tarvi Martens SK eauthentication in Estonia and beyond Tarvi Martens SK E-stonia? Population: 1.35M Internet usage: 56% Internet banking: 88% Mobile penetration: >100% 1000+ Free Internet Access points PKI penetration:

More information

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager

Embedding digital signature technology to other systems - Estonian practice. Urmo Keskel SK, DigiDoc Product Manager Embedding digital signature technology to other systems - Estonian practice Urmo Keskel SK, DigiDoc Product Manager E-stonia? Population: 1.35M Internet usage: 54% Internet banking: 72% Mobile penetration:

More information

e- Estonia - 10 years of experience

e- Estonia - 10 years of experience e- Estonia - 10 years of experience Lessons learned Jüri Voore, Estonian Cer;fica;on Centre PROJECT MILESTONES o First ideas in 1997 o Law on personal iden;fica;on documents: Feb, 1999 o Digital Signature

More information

1. Lifecycle of a certificate

1. Lifecycle of a certificate 1 1. Lifecycle of a certificate 1. Client generates Signing Request (CSR) in his secure computer or server where application will be used. Now client has two s a CSR (usually with CSR extension but it

More information

X-Road. egovernment interoperability framework

X-Road. egovernment interoperability framework X-Road egovernment interoperability framework Serving e-nation over 10 years Backbone of the Estonian egovernment 12 years of active duty, no downtime Over 2000 connected e-services More than 900 connected

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

Digital Signatures in Reality. Tarvi Martens SK

Digital Signatures in Reality. Tarvi Martens SK Digital Signatures in Reality Tarvi Martens SK Free-flowing digital documents Estonia has deployed digitally signed documents which are recognised universally. These are: Perfectly legal For use in arbitrary

More information

PKI Disclosure Statement

PKI Disclosure Statement Land Registry Version 2.0 23/07/2008 PKI Disclosure Statement 1. Introduction Land Registry has created an e-security platform for its customers to facilitate role-based access, authentication and electronic

More information

How To Create A Global Signer For The Internet Of Everything

How To Create A Global Signer For The Internet Of Everything Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the

More information

GENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT

GENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT GENERAL CONDITIONS OF THE EXTENDED VALIDITY CONFIRMATION SERVICE CONTRACT 1. Definitions 1.1. SK AS Sertifitseerimiskeskus. 1.2. Client adult, natural person with active legal capacity or legal person

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Electronic Voting Committee General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-0.98 Date: 23 May 2016 Tallinn 2016 Annotation This paper

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST Thibault.devalroger@opentrust.com

More information

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex Submitted to the EC on 03/06/2012 COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex e-justice Communication via Online Data Exchange ICT PSP call identifier:

More information

The Estonian ID Card and Digital Signature Concept

The Estonian ID Card and Digital Signature Concept The Estonian ID Card and Digital Signature Concept Principles and Solutions Ver 20030307 Contents Contents...2 Status of the document...3 Introduction...3 Intended audience...3 Current project status...3

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

Department of Defense SHA-256 Migration Overview

Department of Defense SHA-256 Migration Overview Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

e-authentication guidelines for esign- Online Electronic Signature Service

e-authentication guidelines for esign- Online Electronic Signature Service e-authentication guidelines for esign- Online Electronic Signature Service Version 1.0 June 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

eid Services as Part of the new German ID Card Ecosystem 27/10/2011

eid Services as Part of the new German ID Card Ecosystem 27/10/2011 eid Services as Part of the new German ID Card Ecosystem The new German ID Card Features ID CARD New Electronic Features 1. Biometrics Digital photo and (if desired), two electronic fingerprints Only legitimate

More information

Risk Reduction for Electronic Signing of Large Value Business Obligations. Michał Tabor

Risk Reduction for Electronic Signing of Large Value Business Obligations. Michał Tabor Risk Reduction for Electronic Signing of Large Value Business Obligations Michał Tabor Trusted Information Consulting Warsaw, 10 October 2013 Project BIO-PKI Biometric techniques and PKI in identity documents

More information

e-estonia Strategic decisions for success

e-estonia Strategic decisions for success e-estonia Strategic decisions for success e-estonia e-estonia e-estonia e-estonia e-estonia e-estonia Just to remind you. We are a very small country in a cold Nordic neighborhood! e-estonia Just to remind

More information

Microsoft Trusted Root Certificate: Program Requirements

Microsoft Trusted Root Certificate: Program Requirements Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.

More information

European Electronic Identity Practices Country Update of Portugal

European Electronic Identity Practices Country Update of Portugal European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations

More information

Log Analysis of Estonian Internet Voting 20132015

Log Analysis of Estonian Internet Voting 20132015 Log Analysis of Estonian Internet Voting 20132015 Sven Heiberg 1 Arnis Parsovs 23 Jan Willemson 24 1 Smartmatic-Cybernetica Centre of Excellence for Internet Voting 2 Software Technology and Applications

More information

Potential efficiency of digital signatures to Finnish SMEs. Tham Nguyen

Potential efficiency of digital signatures to Finnish SMEs. Tham Nguyen Potential efficiency of digital signatures to Finnish SMEs Tham Nguyen Bachelor s Thesis Degree Programme in International Business December 2014 Abstract 07.12.2014 Degree Programme in International Business

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

Den Gode Webservice - Security Analysis

Den Gode Webservice - Security Analysis Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework

More information

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,

More information

DS-05-2015: Trust eservices. The policy context: eidas Regulation

DS-05-2015: Trust eservices. The policy context: eidas Regulation DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

White Paper. Cloud Signing vs. Smartcard Signing

White Paper. Cloud Signing vs. Smartcard Signing White Paper Cloud Signing vs. Smartcard Signing 1. Introduction 2. What is the Goal? What is driving successful Electronic Commerce and e-government solutions? The answer is simple: useful applications

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

sign-me Bundesdruckerei's solution for online signatures using the new German ID card

sign-me Bundesdruckerei's solution for online signatures using the new German ID card Basic information: sign-me sign-me Bundesdruckerei's solution for online signatures using the new German ID card What is sign-me? sign-me is a web application from Bundesdruckerei that enables online signatures

More information

Making Digital Signatures Work across National Borders

Making Digital Signatures Work across National Borders Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det

More information

e-go G ve v rnme m nt G at G eway w www.turkiye.gov.tr Turkish e-government Gateway 5/21/2015 1

e-go G ve v rnme m nt G at G eway w www.turkiye.gov.tr Turkish e-government Gateway 5/21/2015 1 e-government Gateway www.turkiye.gov.tr Turkish e-government Gateway 5/21/2015 1 Instead of looking for information and services on multiple web sites, the e-government Gateway provides a single point

More information

Authentication Scenarios India. Ramachandran

Authentication Scenarios India. Ramachandran Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework

More information

Ericsson Mobile digital identity

Ericsson Mobile digital identity Ericsson Mobile digital identity (Views on delivering solutions and the Business case for the banking and finance community) pedro calderon head of Product line Authentication & digital identity Ericsson

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

Driving Safely on Information Highway. April 2006

Driving Safely on Information Highway. April 2006 Driving Safely on Information Highway April 2006 Agenda FIPS 201 and PK enabling Challenges of PK enabling Ways to meet the challenges PKIF Webcullis (demo) TrustEnabler (demo) FIPS 201 unique PK enabling

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

European Electronic Identity Practices

European Electronic Identity Practices European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary

More information

Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services. Ministry of Public Administrations

Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services. Ministry of Public Administrations Spanish initiative to encourage the use of eid & esignature technologies in egovernment Services Ministry of Public Administrations Miguel Álvarez Rodríguez IT Manager Contents 1. The new eid citizen s

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

The Mobile Phone Signature in edemocracy and egovernment Applications. Gregor.eibl@bka.gv.at

The Mobile Phone Signature in edemocracy and egovernment Applications. Gregor.eibl@bka.gv.at The Mobile Phone Signature in edemocracy and egovernment Applications Gregor.eibl@bka.gv.at Characteristics of the Citizen Card ( 4 Abs. 1 E-GovG) unique identity authenticity Citizen Card = before authenfication:

More information

Design and Implemenation of a Unified e-id Card for Secure e-voting System (MUSES)

Design and Implemenation of a Unified e-id Card for Secure e-voting System (MUSES) Design and Implemenation of a Unified e-id Card for Secure e-voting System (MUSES) Samuel N. John Email: samuel.john {at} covenantuniversity.edu.ng Charles Kayode Ayo Department of Computer & Information

More information

e-signature as a Service

e-signature as a Service e-signature as a Service - A Roadmap In Macao Phoebe Ip Macao Post esigntrust Certification Services 您的電子商務伙伴 O seu Parceiro no Comércio Electrónico 17 September, 2012 Hong Kong Agenda Intro of Macao Post

More information

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 2013 PKI Made Easy: Managing Certificates with Dogtag Ade Lee Sr. Software Engineer Red Hat, Inc. 08.11.2013 Agenda What is PKI? What is Dogtag? Installing Dogtag Interacting with Dogtag using REST Future

More information

Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal

Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise geddis@apple.com 703-264-5103 1 Agenda A View of Apples PKI

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

Signature policy for TUPAS Witnessed Signed Document

Signature policy for TUPAS Witnessed Signed Document Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for

More information

APPLICATION FOR DIGITAL CERTIFICATE

APPLICATION FOR DIGITAL CERTIFICATE Application ID Number (For Official Use only) APPLICATION FOR DIGITAL CERTIFICATE Instructions: 1. Please fill the form in BLOCK LETTERS ONLY. 2. All fields are mandatory. 3. Present one (1) copy and the

More information

SAFE Digital Signatures in PDF

SAFE Digital Signatures in PDF SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates

More information

BIOMETRIC & MULTIPLE-TECHNNOLOGIES MOBILE SOLUTIONS IN HEALTHCARE. www.sicbiometrics.com

BIOMETRIC & MULTIPLE-TECHNNOLOGIES MOBILE SOLUTIONS IN HEALTHCARE. www.sicbiometrics.com BIOMETRIC & MULTIPLE-TECHNNOLOGIES MOBILE SOLUTIONS IN HEALTHCARE www.sicbiometrics.com S.I.C. Biometrics - Company Facts North American Biometric and Identification solutions developer and manufacturer

More information

Best prac*ces in Cer*fying and Signing PDFs

Best prac*ces in Cer*fying and Signing PDFs over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL

More information

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates

More information

End-User Manual. for. e-pramaan: A National e-authentication Service. Submitted to

End-User Manual. for. e-pramaan: A National e-authentication Service. Submitted to e-pramaan: A National e-authentication Service End User Manual version 0.1 1 End-User Manual for e-pramaan: A National e-authentication Service Submitted to Department of Electronics & Information Technology

More information

EHR central system advantages and disadvantages, the case of Estonia. Estonian E-health Foundation Raul Mill

EHR central system advantages and disadvantages, the case of Estonia. Estonian E-health Foundation Raul Mill EHR central system advantages and disadvantages, the case of Estonia Estonian E-health Foundation Raul Mill Estonia - 45 000 km2 1.29 mlj. inhabitants GDP: Agriculture 2,7% Industry 26,3% Service 74,5%

More information

CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com

CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com CODE SIGNING Why Developers Need to Digitally Sign Code and Applications +1-888-690-2424 entrust.com Table of contents Why Code Sign? Page 3 What is Code Signing? Page 4 Verifying Code Authenticity Page

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

IT Security in Banque du Liban

IT Security in Banque du Liban IT Security in Banque du Liban Zeina AOUN Head of Security Division IT Department BANQUE DU LIBAN Workshop on Building Trust and Confidence in Arabic e-services 25-27 May 2010 AGENDA BDL Security Drivers

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Department of Defense PKI Use Case/Experiences

Department of Defense PKI Use Case/Experiences UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO dmmitc3@missi.ncsc.mil UNCLASSIFIED//FOR OFFICIAL USE ONLY Current

More information

TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH. Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia

TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH. Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia TRANSFORMING HEALTH SYSTEM WITH IT Ain Aaviksoo, MD MPH Deputy Secretary General for eservices & Innovation Ministry of Social Affairs of Estonia To be discussed 1. From data accumulation to information

More information

Patient online services in Estonia

Patient online services in Estonia Patient online services in Estonia EHTEL 2012 Symposium: Fact not Fiction Katre Karik; Analyst at the SUSTAINS project Kelli Podošvilev, MSc; SUSTAINS Project manager Peeter Ross, MD, PhD; ehealth expert

More information

E-Lock ProSigner vs. In-built Acrobat 6.0 signatures

E-Lock ProSigner vs. In-built Acrobat 6.0 signatures E-Lock ProSigner vs. In-built Acrobat 6.0 signatures Table of Contents 1 INTRODUCTION... 2 1.1 E-LOCK PROSIGNER WORKS WITH ANY SECURITY FRAMEWORK... 2 1.2 EASY WIZARD BASED SIGNING OPERATION... 2 1.3 BACKWARD

More information

Sicherheitsaspekte des neuen deutschen Personalausweises

Sicherheitsaspekte des neuen deutschen Personalausweises Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik egov Fokus 2/2013: Identity- und Access Management im E-Government Rethinking

More information

Adobe PDF for electronic records

Adobe PDF for electronic records White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Position Paper European Citizen Card: One Pillar of Interoperable eid Success

Position Paper European Citizen Card: One Pillar of Interoperable eid Success Position Paper European Citizen Card: One Pillar of Interoperable eid Success October 2008 Disclaimer Eurosmart takes reasonable measures to ensure the quality of the information contained in this document.

More information

Internet Banking Internal Control Questionnaire

Internet Banking Internal Control Questionnaire Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?

More information

How To Get Smart Cards From Atos

How To Get Smart Cards From Atos secure authentication and trusted identity delivering assurance and efficiency to every sector with CardOS Smart Card Solutions Your business technologists. Powering progress Delivering certainty through

More information

INFORMATION TECHNOLOGY CERES DEPARTMENT

INFORMATION TECHNOLOGY CERES DEPARTMENT INFORMATION TECHNOLOGY CERES DEPARTMENT LRA APPLICATION MANUAL Name Date Written by: Technical support 18/10/2010 Revised by: Approved by: DOCUMENT TRACEABILITY Version Date Description Author 1.0 18/10/2010

More information

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Security and Security Certificates for OpenADR systems. Background. Content:

Security and Security Certificates for OpenADR systems. Background. Content: Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting

More information

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012 Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12

More information

CA-DAY 2014. Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft

CA-DAY 2014. Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft CA-DAY 2014 Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft Microsoft s Root Program in 2014 New Technical Requirements Published in November 2013 First

More information

eid/authentication/digital signatures in Denmark

eid/authentication/digital signatures in Denmark eid/authentication/digital signatures in Denmark 8. July 2008 Nikolas Triantafyllidis / Charlotte Jacoby Special Advisors Centre for Digital Signatures National IT- and Telecom Agency Authentication and

More information

HSM: A Must Have. Applications are everywhere. www.safenet-inc.com. 2006 SafeNet Inc. All rights reserved.

HSM: A Must Have. Applications are everywhere. www.safenet-inc.com. 2006 SafeNet Inc. All rights reserved. What is an HSM HSM: A Must Have Applications are everywhere HSM: A Must Have Secrecy, Control, Payment, Rights are all attributes of applications Security & Keys are used HSM: A Must Have Keeping Keys

More information

National Register of Associations. Number 171.443. CIF G-63287510.

National Register of Associations. Number 171.443. CIF G-63287510. Certificate Policy for Secure Server (SSL), Extended Validation (EV) SSL, Electronic Office and Extended Validation (EV) Electronic Office Certificates National Register of Associations. Number 171.443.

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

Identity & Privacy Protection

Identity & Privacy Protection Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation turissd@orc.com 703 246 8550 CyberSecurity One of the most serious economic

More information

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper. EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple

More information

ComSignTrust e-signing Solutions

ComSignTrust e-signing Solutions ComSignTrust e-signing Solutions Agenda Comda group introduction Our e-signing solutions e-idas central signing compliance ComSignTrust's Icon government clients Other success stories 2 ComSignTrust company

More information

PKI - current and future

PKI - current and future PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi

More information

Service Description. 3SKey. Connectivity

Service Description. 3SKey. Connectivity Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

ELM Manages Identities of 4 Million Government Program Users with. Identity Server

ELM Manages Identities of 4 Million Government Program Users with. Identity Server ELM Manages Identities of 4 Million Government Program Users with Identity Server ELM Implements Single Sign-on With WSO2 Identity Server to Streamline Administration, Improve Productivity, and Reduce

More information

Reducing fragmentation in a scattered eid marked

Reducing fragmentation in a scattered eid marked Reducing fragmentation in a scattered eid marked Norstella, eid workshop Oslo, 16 th September 2014 Arne Vidar Haug VP Business Development / Co-Founder, Signicat About Signicat Cloud eid / esignature

More information