FedICT. Carte d identité électronique (BELPIC) egovernment. Architecture et stratégie. E-government. Simplification administrative

Size: px
Start display at page:

Download "FedICT. Carte d identité électronique (BELPIC) egovernment. Architecture et stratégie. E-government. Simplification administrative"

Transcription

1 Carte d identité électronique () FedICT egovernment Ir. Olivier LIBON. Forum Telecom Liège, 27 Mars 2003 E-government Architecture et stratégie Simplification administrative Citoyens Entreprises Fonctionnaires Front-Office: Principe de la collection unique des données Portail Fédéral & FedMAN UME (Unified Messaging Engine) Back-Office: Principe des Sources Authentiques Banque carrefour des entreprises Registre National (FedPKI) PORTAIL UME BCE COMMUNICATION APPLICATION INTEGRATION Etat des projets clés (*) Etat des projets clés FEDMAN 1st phase FedMAN rounded off 16 Network Access Points 2nd phase planned January 2003 UME UME v2 delivered Stress testing : December 2002 Production: January 2003 CBE CBE in production on 2nd January 2003 Transition periode enterprise numbers Portal Static portal First version finished Open limited audience (FedMAN) : 18 November 2002 Release big audience: 27 November 2002 Transactional portal: Due Dilligence rounded off Design and development phase launched Delivery : March 2003 (*) The mentioned data are estimations of the timing. This timing is based on a series of legal and regulatory decisions of which the realization falls out of the competences of the authors.

2 : BELgian electronic Personal Identity Card Belgian ELectronic Personal Identity Card concept But Aspects visuels Donner à chaque citoyen belge une carte d identité électronique lui permettant de: s authentifier (preuve d identité) signer électroniquement (outil de signature) identification visuelle du porteur D un point de vue visuel: identique à la carte d identité actuelle : le nom de famille les deux premier Prénoms la première lettre du troisième prénom la nationalité le lieu et la date de naissance le sexe les dates de début et fin de validité le numéro de carte la photo la signature le numéro de registre national l adresse (jusque 31/12/2003) le lieu de délivrance la signature de l autorité Aspects électroniques Autentification Identification électronique du porteur D un point de vue électronique: la puce contient la même information que ce qui est imprimé sur la carte à l exception de: la signature du porteur qui est remplacée par une paire de clés & certificats (d autentification et de signature) la signature de l autorité est remplacée par une chaîne de certificats électroniques le protections visuelles qui sont remplacées par des protections électroniques crytpographiques (temporairement) pas de clé d encryption pas de portefeuille électronique pas d informations biométriques conforme à la directive européenne 1999/93/EC Applications: site web, bibliothèque, park à containers,

3 VRK Meikäläinen Matti Bull VRK Meikäläinen Matti Bull Signature X.509 v3 certificate CM - Card Manufacturer Production Process Distribution Process (5) (5) (4) CM/CP/CI (4) CM/CP/CI (10a2) (6) (8) (10a2) (6) (8) (10a1) (3) National Register (9) (7) (10a1) (3) Rijksregister (9) (7) Municipality Gemeente (1) The municipalities De (10b) De Gemeenten (1) (10b) Face to face identification PIN & PUK1-code Face to face identification PIN & PUK1-code (2) (12) (11) (2) (12) (11) (13) (13) Personlization Process CA - ificate Authority

4 FedPKI EIC and PKI PKI is a transparent frameworkof services, products and facilities to facilitate securization, i.e. the crucial keystonefor e- government FedPKI = PKI for civil servants and machines involved in the distribution of the electronic identity card Part project Same PKI as for citizen (simple migration from civil servants card to electronic identity card) Free use and free verification of identity certificate for relations with authorities Possibility of separate use of identity and attribute certificates Private key for digital signature securized with PIN Use of open technical standards Card Specifications Chip specifications Standard - ISO/IEC 7816 Format & Physical Characteristics Bank Card (ID1) Standard Contacts & Signals RST,GND,CLK,Vpp,Vcc, I/O Standard Commands & Query Language (APDU) Chip characteristics: Cryptoflex JavaCard 32K CPU (processor): 16 bit Micro-controller Crypto-processor: 1100 bit Crypto-Engine (RSA computation) 112 bit Crypto-Accelerator (DES computation) ROM (OS): 136 kb (GEOS Java Virtual Machine) EEPROM (Applic + Data): 32 KB (Cristal Applet) RAM (memory): 5 KB I/O Crypto ROM (DES,RSA) (Operating System) CPU EEPROM (File System= applications + data) RAM (Memory) GEOS JVM CRISTAL Applet ID data, Keys, s. Data specifications Technical specifications BelPIC Card Key Auth Key Sign Key Auth Sign CA Root Directory Structure (PKCS#15) Dir (BelPIC): certificates & keys (PIN code protected) standard format (to be used by generic applications) ID Microsoft CryptoAPI ( Windows) PKCS#11 ( UNIX/Linux & MacOS) ID Dir (ID): contains full identity information ADR first name, last name, etc. address PIC picture proprietary format (to be used by dedicated applications only) Keys and certificates private and public keyca : 2048 bits private and public key citizen: 1024 bits Signatures put via RSA with SHA-1 all certificates are conform to X.509 v3

5 Role, Common KeyPair Object Signing Role, Common KeyPair Object Signing CA hierarchy CA hierarchy GlobalSign GlobalSign Belgium Self- Signed Belgium RootSigned Belgium Self- Signed Common KeyPair Belgium RootSigned Administration CA Citizen CA Government CA Interface Signing Auth. SSL Server, Administration CA Citizen CA Government CA Role, Interface Signing Auth. SSL Server, Object Signing CA hierarchy ificate specifications Belgium Self- Signed Administration CA Citizen CA Government CA Interface Signing Auth. GlobalSign Belgium RootSigned SSL Server, Belgium Root CA Citizen Citizen CA CA Auth Sign Crypt Citizen s certificates & keys Authentication ificate & key pair (1024 bits) provide strong authentication (access control) web site authentication single sign-on (login) Signature ificate & key pair (1024 bits) provide non repudiation (electronic signature equivalent to handwritten signature) Document Signing Form Signing (Encryption ificate & key pair) foreseen at a later stage private key backup/archiving MiddleWare specifications Windows Generic Applics MS-CSP (Microsoft interface) PIN (pin logic library) DLL (C-reader DLL) Non Win Generic Applics PKCS#11 (ificate& Keys Management) BelPIC Specific Applics PKCS#15 OpenSC (Generic SC Interface) PC/SC (Generic SC ReaderInterface) Driver (Specific SC Reader Interface) Card & Reader Software Card MiddleWare PKCS#15 ID specific applications Card is accessed as a simple file system No key management possible (no PIN) for belgian police, post, banks, etc PKCS#11 Generic applications Only keys & s available via PKCS#11 API allows authentication (& signature) for Netscape, Linux, Unix, etc MS-CSP Windows applications Only keys & certs available via MSCryptoAPI allows authentication (& signature) for Microsoft Explorer, Outlook, etc Reader Driver/Firmware most part is generic (orange part) small part is specific (green part) PROJECT I/O

6 Legal framework Project Electronic signature (9 July 2001) Implementation of the European Directive 1999/93/EC Law on National Register and identity cards Simplification of the procedure to gain access to the information data from the National Register and to use the identification number Introduction electronic identity card Two parallel projects : infrastructure central : NRN decentral : cities and municipalities electronic identity card production, personalization, initialization and distribution of electronic identity card Delivery of certification services Involvement Fedict : Project reporting CA part To coordinate and elaborate applications using the EIC Control consistency with the federal portal environment Planning (*) A card and then? KICK OFF Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep : development, testing infrastructure GO/NO GO 2 : analyse, testing, card production 3 : analyse, testing certification services 4 : start pilot 11 municipalities (Borsbeek, Leuven, Tongeren, Jabbeke, Geraardsbergen, Lasne, Seneffe, Seraing, Marche-en- Famenne, Rochefort, Sint-Pieters-Woluwe) (*) This planning is an estimation of the timing. This timing is based on a series of legal and regulatory decisions of which the realization falls out of the competences of the authors. 3 18/03 4 On the short term : e-government Examples : Tax declaration Vehicle registration (DIV) On the long term : extra possibilities such as financial sector (banks) health sector (SIS) transport (tickets, parking, ) e-security (SSO, login, ) Ultimate aim: the identity card is the only card in the wallet of the Belgian citizens.

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved

eid Security Frank Cornelis Architect eid fedict 2008. All rights reserved eid Security Frank Cornelis Architect eid The eid Project > Provides Belgian Citizens with an electronic identity card. > Gives Belgian Citizens a device to claim their identity in the new digital age.

More information

OECD workshop on digital identity management BELGIAN approach

OECD workshop on digital identity management BELGIAN approach OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

The Belgian e-id: hacker vs developer

The Belgian e-id: hacker vs developer OWASP Belgium Chapter The OWASP Foundation http://www.owasp.org The Belgian e-id: hacker vs developer Erwin Geirnaert ZION SECURITY Frank Cornelis Fedict Agenda The OWASP Foundation http://www.owasp.org

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò gpaterno@gpaterno.com June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos

More information

RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne

RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment. Carolin Latze University of Berne RVS Seminar Deployment and Performance Analysis of JavaCards in a Heterogenous Environment Carolin Latze University of Berne Table of contents > Introduction Smartcards > Deployment Overview Linux Windows

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Draft Middleware Specification. Version X.X MM/DD/YYYY

Draft Middleware Specification. Version X.X MM/DD/YYYY Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions

More information

Smart Card Technology Capabilities

Smart Card Technology Capabilities Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards

More information

Using PIV Smart Cards on Linux for Authentication to Windows Active Directory

Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio

More information

Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal

Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise geddis@apple.com 703-264-5103 1 Agenda A View of Apples PKI

More information

Identity Management and eid Integration

Identity Management and eid Integration Identity Management and eid Integration Luc Wijns > Principal Architect > Security Ambassador & CISSP > Sun Microsystems Agenda Sun Identity Management Integration of the eid Card > Authentication & Signature

More information

E-CERT C ONTROL M ANAGER

E-CERT C ONTROL M ANAGER E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

Secure Messaging Challenge Technical Demonstration

Secure Messaging Challenge Technical Demonstration Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum Boeing s Messaging Needs Provide access to strongly encrypted e-mail outside the enterprise Reduce complexity of deploying secure

More information

European Electronic Identity Practices Country Update of Portugal

European Electronic Identity Practices Country Update of Portugal European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

Supporting Smart Cards in UEFI

Supporting Smart Cards in UEFI presented by Supporting Smart Cards in UEFI UEFI PlugFest March 18-22, 2013 Presented by Jean Lusetti (Gemalto) Updated 2011-06-01 UEFI Spring PlugFest March 2013 www.uefi.org 1 Agenda Who is Gemalto?

More information

Thailand Business visa Application for citizens of Hong Kong living in Manitoba

Thailand Business visa Application for citizens of Hong Kong living in Manitoba Thailand Business visa Application for citizens of Hong Kong living in Manitoba Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for

More information

Security Policy for FIPS 140 2 Validation

Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface

More information

Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved

Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party

More information

ASA 8.x: Renew and Install the SSL Certificate with ASDM

ASA 8.x: Renew and Install the SSL Certificate with ASDM ASA 8.x: Renew and Install the SSL Certificate with ASDM Document ID: 107956 Contents Introduction Prerequisites Requirements Components Used Conventions Procedure Verify Troubleshoot How to copy SSL certificates

More information

FEITIAN PKI Authentication Token. epass2003 with FIPS 140-2 Cer tification

FEITIAN PKI Authentication Token. epass2003 with FIPS 140-2 Cer tification FEITIAN PKI Authentication Token epass2003 with FIPS 140-2 Cer tification Document Digital Signature Email signature and encryption Windows Smart Card Logon Remote VPN Access Secure Online Transaction

More information

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

Congo Republic Tourist visa Application

Congo Republic Tourist visa Application Congo Republic Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Congo Republic tourist visa

More information

The Ultimate Authentication Technology

The Ultimate Authentication Technology "USB tokens will be widely adopted into the market because of their low price and greater convenience." IDC, 2003 The Ultimate Authentication Technology The Digital Identity Paradigm Network security and

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

Smart Cards a(s) Safety Critical Systems

Smart Cards a(s) Safety Critical Systems Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas Paradinas@gemplus.com Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business

More information

CRESCENDO SERIES Smart Cards. Smart Card Solutions

CRESCENDO SERIES Smart Cards. Smart Card Solutions CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to

More information

Secure Wireless Application Platform

Secure Wireless Application Platform Texas Instruments SW@P Secure Wireless Application Platform New Challenges for Wireless Handsets Open Environment Multi-application, Interoperability Multiple Access Data Paths GSM/GPRS, EDGE, 802.11,

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Congo Republic Tourist visa Application for citizens of Paraguay living in Alberta

Congo Republic Tourist visa Application for citizens of Paraguay living in Alberta Congo Republic Tourist visa Application for citizens of Paraguay living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time

More information

Egypt s E-Signature & PKInfrastructure

Egypt s E-Signature & PKInfrastructure EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:

More information

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module

More information

IQS Identity and Access Management

IQS Identity and Access Management IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination

More information

Secure Enterprise Applications enabled by SETECS Security Infrastructure Products

Secure Enterprise Applications enabled by SETECS Security Infrastructure Products Secure Enterprise Applications enabled by Security Infrastructure 1. Secure E mail/secure Web (SSL) 2. Secure Web Services: Identity Management, Single Sign On, and Web Authorization 3. Public Key Infrastructure

More information

Linux A multi-purpose executive support for civil avionics applications?

Linux A multi-purpose executive support for civil avionics applications? August 2004 Serge GOIFFON Pierre GAUFILLET AIRBUS France Linux A multi-purpose executive support for civil avionics applications? Civil avionics software context Main characteristics Required dependability

More information

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240 PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,

More information

Democratic Republic of the Congo Tourist visa Application

Democratic Republic of the Congo Tourist visa Application Democratic Republic of the Congo Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Democratic

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

JBoss Enterprise Middleware. The foundation of your open source middleware reference architecture

JBoss Enterprise Middleware. The foundation of your open source middleware reference architecture JBoss Enterprise Middleware The foundation of your open source middleware reference architecture Red Hat open source solution stack changes the economics of IT infrastructure Offers proprietary replacements

More information

Gabon Tourist visa Application for citizens of Canada living in Alberta

Gabon Tourist visa Application for citizens of Canada living in Alberta Gabon Tourist visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your

More information

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file 1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer

More information

Benin Business visa Application

Benin Business visa Application Benin Business visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Benin business visa checklist Filled

More information

Department of Defense SHA-256 Migration Overview

Department of Defense SHA-256 Migration Overview Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto

More information

Office of the Secretary of State

Office of the Secretary of State General Office Overview Assembly Government Affairs, February 25, 2011 Office of the Secretary of State Commercial Recordings Securities Notary Division Elections State Business License Domestic Partnership/Athletes

More information

Certificate of Incorporation Certificat de constitution

Certificate of Incorporation Certificat de constitution Request ID: 014752622 Province of Ontario Date Report Produced: 2012/10/30 Demande n : Province de ('Ontario Document produit le: Transaction ID: 0491 1 1 718 Ministry of Government Services Time Report

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Congo Republic Tourist visa Application

Congo Republic Tourist visa Application Congo Republic Tourist visa Application Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your travel: Congo Republic tourist visa

More information

Solaris 10 Documentation README

Solaris 10 Documentation README Solaris 10 Documentation README Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0550 10 January 2005 Copyright 2005 Sun Microsystems, Inc. 4150 Network Circle, Santa

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

Computing & Telecommunications Services Monthly Report March 2015

Computing & Telecommunications Services Monthly Report March 2015 March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified

More information

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security

More information

24x7 Help Desk Services Questions & Answers for RFP 40016_21030705

24x7 Help Desk Services Questions & Answers for RFP 40016_21030705 24x7 Help Desk Services Questions & Answers for RFP 40016_21030705 1. What % of the call volume that was listed in the RFP was related to LMS (BB and Moodle) support? See Table 5 2. What is the number

More information

STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire 2010-2011)

STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire 2010-2011) Institut d Administration des Entreprises SOCRATES/ERASMUS APPLICATION DEADLINE : 20th November 2010 OTHER (Autre) STUDENT APPLICATION FORM (Dossier d Inscription) ACADEMIC YEAR 2010-2011 (Année Scolaire

More information

1-20020138637 26-sept-2002 Computer architecture and software cells for broadband networks Va avec 6526491

1-20020138637 26-sept-2002 Computer architecture and software cells for broadband networks Va avec 6526491 Les brevets CELL 14 décembre 2006 1 ARCHITECTURE GENERALE 1-20020138637 26-sept-2002 Computer architecture and software cells for broadband networks 6526491 2-6526491 25-févr-03 Memory protection system

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions.

Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the

More information

FRANCE (FRANCE) : Trusted List

FRANCE (FRANCE) : Trusted List ANCE (ANCE) : Trusted List Tsl Id: ID0001 Valid until nextupdate value: 2015-12-28T23:00:00Z TSL signed on: 2015-06-30T09:08:50Z PDF generated on: Tue Jun 30 11:10:36 CEST 2015 ANCE (ANCE) - Trusted List

More information

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,

More information

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

More information

Liste d'adresses URL

Liste d'adresses URL Liste de sites Internet concernés dans l' étude Le 25/02/2014 Information à propos de contrefacon.fr Le site Internet https://www.contrefacon.fr/ permet de vérifier dans une base de donnée de plus d' 1

More information

2 RENSEIGNEMENTS CONCERNANT L ASSURÉ SI CELUI-CI N EST PAS LE REQUÉRANT INFORMATION CONCERNING THE INSURED PERSON IF OTHER THAN THE APPLICANT

2 RENSEIGNEMENTS CONCERNANT L ASSURÉ SI CELUI-CI N EST PAS LE REQUÉRANT INFORMATION CONCERNING THE INSURED PERSON IF OTHER THAN THE APPLICANT SÉCURITÉ SOCIALE SOCIAL SECURITY ACCORD DU 9 FÉVRIER 1979 ENTRE LA FRANCE ET LE CANADA AGREEMENT OF FEBRUARY 9, 1979 BETWEEN FRANCE AND CANADA Formulaire FORM SE 401-06 INSTRUCTION D UNE DEMANDE DE PENSION

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents

More information

Effective use of Digital Identities and ID cards in a Government Environment

Effective use of Digital Identities and ID cards in a Government Environment Effective use of Digital Identities and ID cards in a Government Environment Bavo De Ridder Principal Information Security Consultant Competence Leader IAM Erik R. van Zuuren Principal Information Security

More information

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Intel Identity Protection Technology with PKI (Intel IPT with PKI) Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION

More information

Sophos (Schweiz) AG May 2012

Sophos (Schweiz) AG May 2012 Sophos (Schweiz) AG May 2012 Agenda 08:30 Accueil 08:45 Sécurité complète et programme de partenariat 09:15 Update & Roadmap produits, avec une démonstration live du Sophos UTM V9 10:00 Pause café 10:15

More information

Technical Service Bulletin

Technical Service Bulletin Technical Service Bulletin FILE CONTROL CREATED DATE MODIFIED DATE FOLDER OpenDrive 02/05/2005 662-02-25008 Rev. : A Installation Licence SCO sur PC de remplacement English version follows. Lors du changement

More information

Cameroon Visitor visa Application for citizens of Canada living in Alberta

Cameroon Visitor visa Application for citizens of Canada living in Alberta Cameroon Visitor visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your

More information

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared

More information

Gabon Business visa Application for citizens of Canada living in Alberta

Gabon Business visa Application for citizens of Canada living in Alberta Gabon Business visa Application for citizens of Canada living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your

More information

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%

More information

Tanenbaum, Computer Networks (extraits) Adaptation par J.Bétréma. DNS The Domain Name System

Tanenbaum, Computer Networks (extraits) Adaptation par J.Bétréma. DNS The Domain Name System Tanenbaum, Computer Networks (extraits) Adaptation par J.Bétréma DNS The Domain Name System RFC 1034 Network Working Group P. Mockapetris Request for Comments: 1034 ISI Obsoletes: RFCs 882, 883, 973 November

More information

opennms reporting generation tool

opennms reporting generation tool opennms reporting generation tool Juan Pedro Escalona DevOps Southampton, UK - 2014 Juan Pedro Escalona DevOps / Systems Administrator with over 6 years experience administering different OS, network systems

More information

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time

More information

ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example

ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example Document ID: 98596 Contents Introduction Prerequisites Requirements Components Used Conventions Configure

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

Interfaces de programmation pour les composants de la solution LiveCycle ES (juillet 2008)

Interfaces de programmation pour les composants de la solution LiveCycle ES (juillet 2008) Interfaces de programmation pour les composants de la solution LiveCycle ES (juillet 2008) Ce document répertorie les interfaces de programmation que les développeurs peuvent utiliser pour créer des applications

More information

Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle

Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle Discoverer' with Oracle Single Sign On', 'Oracle Internet Directory' and 'Virtual Private Database' for the Luxembourg communities. How to make sure

More information

CardOS API V3.2. Standard cryptographic interface for using applications with CardOS smart cards

CardOS API V3.2. Standard cryptographic interface for using applications with CardOS smart cards API V3.2 API is an integration software for the use of smart cards and security tokens in a variety of applications and heterogeneous operating system environments. API is compatible with international

More information

Cameroon Tourist visa Application for citizens of Tahiti living in Alberta

Cameroon Tourist visa Application for citizens of Tahiti living in Alberta Cameroon Tourist visa Application for citizens of Tahiti living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for your

More information

Issues in Smart Card Development

Issues in Smart Card Development Middleware Issues in Smart Card Development Simplifying Smart Card Access under Windows a White Paper Abstract In todays business environment there is an increased awarness of security, which is driving

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

Java Card. Smartcards. Demos. . p.1/30

Java Card. Smartcards. Demos. . p.1/30 . p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards

More information

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Measurement and Analysis Introduction of ISO7816 (Smart Card) Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by

More information

SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2016 APPLICATION FORM

SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2016 APPLICATION FORM SCHOLARSHIP ANSTO FRENCH EMBASSY (SAFE) PROGRAM 2016 APPLICATION FORM APPLICATION FORM / FORMULAIRE DE CANDIDATURE Applications close 4 November 2015/ Date de clôture de l appel à candidatures 4 e novembre

More information

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Technical Note Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Certificates are automatically generated when you install vcenter Server and ESX/ESXi. These default certificates are not signed

More information

Cameroon Tourist visa Application for citizens of Maldives living in Alberta

Cameroon Tourist visa Application for citizens of Maldives living in Alberta Cameroon Tourist visa Application for citizens of Maldives living in Alberta Please enter your contact information Name: Email: Tel: Mobile: The latest date you need your passport returned in time for

More information

Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator

Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator Bringing MNOs an end to end Mobile Connect Solution Mobile Connect for Mobile Network Operator 1 What is Mobile Connect for MNO? 2 Unmatched end to end solution 1. Complete authenticator out of the box

More information