Telecommunications, Information, Media & Electronics. Digital Signatures. Paving the Way to a Digital Europe
|
|
|
- Buck Barker
- 10 years ago
- Views:
Transcription
1 Telecommunications, Information, Media & Electronics Digital Signatures Paving the Way to a Digital Europe
2 Content Introduction 3 Digital Signatures Authenticity and Integrity of Data Provides a High Level of Security 4 Benefits Include Decreased Costs and Greater Efficiency 7 Several Challenges Still Need to be Overcome 8 New Legislation will Further Promote the Use of E-signatures 9 The Digital Signature Market is Highly Fragmented and Dynamic 10 Use Cases Provide Insight into the Practical Application of Digital Signatures 12 Credit Agricole Consumer Finance Case Study 13 Conclusion 14 Authors: Nicolai Schaettgen Principal TIME, Austria [email protected] Didier Levy Director TIME, France [email protected] Julien Duvaud-Schelnast Manager TIME, France [email protected] Sorana Socol Business Analyst TIME, Austria [email protected]
3 Introduction Digital signature solutions are quickly replacing paper-based signatures and have the potential to dominate signature-related processes. The primary benefits of this technology include increased efficiency, lower costs and increased customer satisfaction. Processes that still require a handwritten signature slow down turnaround time, increase complexity in terms of archiving, and also raise environmental issues with regards to paper usage. Companies are therefore increasingly adopting digital signature solutions to address those challenges. The financial services industry is the pioneer in the adoption and development of digital signature solutions, and we expect other industries, such as telecommunica tion, commerce, utilities, notaries and healthcare, to follow soon as the benefits of this new technology, namely increased efficiency, lower costs and increased customer satisfaction, are not restricted to any industry. While offering clear advantages, digital signature solutions still need to overcome some challenges, such as the need to adapt existing systems and processes to the new technology, concern about acceptance by business partners and the perceived high cost. The European Union is currently finalizing regulation, which will increase the legal value of advanced electronic signatures and remote electronic signing services by offering the possibility to generate a qualified digital signature using a remote signing system. The regulation is expected to be enacted in early July This development is expected to serve as an example for other markets on how to approach digital signatures from a regulatory standpoint. This report is based on Arthur D. Little s survey of 50 market experts in Europe, as well as comprehensive secondary market research. In this report, we provide an overview of the digital signature technology, its current and potential market, as well as the benefits and challenges it brings. We also present examples of practical applications of digital signature solutions. 3
4 Digital Signatures Authenticity and Integrity of Data Provides a High Level of Security Digital signature solutions are quickly replacing paper-based signatures and have the potential to dominate signature-related processes. The primary benefits of this technology include increased efficiency, lower costs and increased customer satisfaction. Digital signatures need to be clearly distinguished from ordinary authentication processes. While authentication is only used to verify the identities of end-users, digital signatures also ensure the integrity of data. A combination of these two security factors is critical for many business transactions, especially those involving sensitive and confidential data. Digital signatures are a sub-category of electronic signatures. While an electronic signature can be any kind of data attached to a document, such as a written name below an , a digital signature is based on a mathematical process of protecting the document. There are two major types of digital signatures, differentiable only by how securely the authentication has been processed: n n Qualified digital signature (QES) is a signature that is created with a secure signature-creation device, other than the device where the document is actually signed, which provides very high security; n n Advanced digital signature (AES) is a digital signature where the signature could be created on the same device where the document is signed, which is somewhat less secure than QES A digital signature involves three processes: the signing process, the authentication process and the process of ensuring the integrity of data. The process of creating a digital signature is the same, whether internally or externally managed. nthe n signing process starts by providing an end-user with a document that needs to be signed. In order to be sure that the correct person signs the contract, the end-user s identity is verified by multiple factor authentication, such as a PIN, password and sequence-based token codes. Once the identity is verified, the signer receives a certificate proving his identity and providing him with a pair of keys: a private key (known only to the signer) and a public key (known to the public). These keys are necessary to sign a document and to verify the identity of the signer. Once the certificate is issued, a unique mathematical code is created out of the document. This mathematical code is then encrypted with the private key (signing) and can only be decrypted with the corresponding public key (verification of signature). The document, together with the encrypted mathematical code, is then sent to the recipient. n n In order to ensure authenticity, the recipient with access to the public key can decrypt the mathematical code and is therefore able to ensure authenticity. The public key works for decryption only if the document was signed with the corresponding private key already confirming the identity of the signer. nthe n integrity of data is ensured through a mathematical code, which is visible to the receiver after the decryption. To verify that the document has not been changed by any unauthorized person, the receiver calculates his own mathematical code out of the document. If both codes match, the integrity of the data is ensured; if the document had been changed in transition, the receiver s calculation would give a different code. Figure 1: The Digital Signature signing and verification processes Signing process Hash function Source: Arthur D. Little Hash value Encryption with private key Digitally signed data Verification process Hash function Decryption with public key? = The digital signature is valid only if the hash values are equal. 4
5 Figure 1 illustrates the signing and verification process on the basis of the RSA (Rivest, Shamir and Adleman) cryptosystem technology, which is the most widely used encryption technology. The encryption process described above provides the foundation for the high security and the legal validity of this technology. The mathematical encryption combined with a high quality certificate ensures the integrity and authenticity of the digital signature. The resulting advanced digital signature is covered under EU law and therefore legally valid. Any process not encompassing these security measures are not regarded as secure or legally valid. Remote and face-to-face transactions should therefore be based on the above procedure of securing data. For example, a handwritten digital signature on a signature pad without a digital signature created is not legally valid in court decisions, based on the precedent legal case from June 2012 in Germany 1. Other commonly used techniques encompass the recognition of biometric data, such as the speed or pressure of the signature, in order to authenticate the signatory. This technology is certainly more secure than a simple handwritten signature on a signature pad, but it is not covered by EU law or most national laws and provides therefore no legal validity. There are two major ways to offer digital signature solutions to end-users: an externally managed process and an internally managed process. Although both have advantages and disadvantages, based on analysis of market trends, Arthur D. Little believes that the externally managed process will be the solution of the future. Externally managed process (external Public-Key- Infrastructure or PKI) During the externally managed process, an external company provides the certificates needed for the digital signature. The third party is responsible for providing one-time certificates to employees and / or customers of the company after they have been authenticated. With a fully externally managed process, companies do not need to invest in set-up and maintenance, which results in a lower overall cost of implementation. Preferably, the external service provider should offer a full cloud solution, the primary advantage of which is that the certificates are not stored on any SSCD (Secure Signature Creation Device or token), but in the cloud and can therefore be used on any device. Furthermore, no specific Software as a Service (SaaS) has to be installed, increasing the level of trust and convenience 1 for the customer. Studies have shown that customers who are asked to install software when digitally signing are more likely to cancel the process. For customers, the strongest incentive is convenience. Digital signatures are a much easier way to sign for a document compared to plugging an e-id card into a PC and even to the traditional handwritten signature. The cloud enables companies also to offer multi-chael signatures (e.g. one signature from home, the other from mobile phone). As mobile signing from a tablet or smart phone becomes more popular, a cloud-managed service will be the preferred technology. This was also confirmed in the interviews Arthur D. Little conducted, in which one market player responded, Why should we ask customers to carry always a token or smart-card reader with them? It is important to mention here that this type of concept makes the most sense if the third party is a trusted one, such as on the EU trusted list. This will not only raise the overall level of trust, but the certificates provided by a trusted third party are recognized virtually worldwide, which means that the root certificate, a certificate that is verified as trusted, is already installed in most browsers and operating systems and no error message will appear as with the internally managed process. With cloud solutions, there is also the possibility to perform the signature with an SSCD or a smart card. Here the cloud can be used to securely archive the digitally signed documents. Internally managed process (internal PKI) The certificates needed for the digital signature are established and provided internally by the company offering these solutions to employees or customers directly. Certificates are not onetime certificates, but can be reused, as they are stored on specific badges, such as a token, smart cards, etc. The concept requires an infrastructure that securely manages identities and corresponding certificates. The process of implementing a PKI involves an investment into hardware, software, and training for employees, and is therefore rather applicable for larger corporations with the corresponding knowledge and resources. A major drawback of the internal PKI concept is that the certificates are in most cases not trusted by browsers and operating systems, unless the company is on the EU trusted list. Depending on the resources available and the level of trust and control required, each company has to weigh which solution suits it best. However, there are already indications that solutions where additional external devices are needed to create digital signatures will not be popular with the general public. 15 European countries deployed electronic identity cards (eid) 5
6 containing credentials for online authentication, with a majority also offering an optional digital signature function. To be able to make use of this digital signature function, a card reader for the eid needs to be bought, further complicating this concept. The potential of this solution could, however, be improved with NFC (Near Field Communication) technology enabling the usage of the digital signature with eids without a card reader, such as with an NFC smart phone. Although the ability to sign using a smart phone would guarantee a higher level of mobility, it is expected that full cloud solutions not requiring any card or card reader will dominate the future market for digital signatures, as the level of convenience provided will be the decisive factor in the choice of solution. 6
7 Benefits Include Decreased Costs and Greater Efficiency Digital signatures can be implemented in a variety of areas as companies can use digital signatures for their internal processes or communication with business partners and customers. Governments are also an important category of customers for this technology, as they are increasingly required to implement leaner and cost-minimizing processes. Many companies and governments have already realized the potential of this technology. A fully digital process of signing and sending documents decreases work hours and reduces cost in paper and transport. Arthur D. Little s survey and further analysis confirmed that the immediate adoption of the technology has the potential to create a sustainable competitive advantage independent of the industry in which a company operates. According to the results of Arthur D. Little s survey, the main argument for adopting the technology is to improve efficiency, leading to the reduction of costs, and to increase to the speed of the overall business. The use of digital signatures decreases costs by reducing processing costs, such as scaing, recording, archiving, printing and mailing, and reduces resource expense (less process cycle time results in lower persoel expenses). Business processes are also made more efficient by increasing the overall agility of enterprises (reduced process cycles, speed of closing business) and through the real time tracking and coordination of business. Besides efficiency considerations, adopting digital signature solutions portray a progressive image of both the user and the provider of such technologies. Also digital signature solutions have the potential to increase customer convenience. For example, a bank can offer its customers multi-chael solutions to sign a loan agreement. Although industry experts taking part in the survey did not regard increased security as a major benefit of the technology, digital signatures provide a higher level of security than traditional methods of sending documents, when implemented appropriately with cryptographic procedures with qualified certificates: n n The integrity of data can be ensured as counterfeiting is virtually impossible, while a paper document can be modified after being signed by an unauthorized person, n n The probability of losing a digital copy is much lower compared to paper-based documents, n n All types of data, such as photos or audio files, can be digitally signed, which protects the copyright of these materials, n n A timestamp can be attached to the digital signature, ensuring that the document was signed on a specific date. Figure 2: The major benefits of Digital Signatures What do you see as the main benefits expected of deploying Digital Signature solutions? (1-highest; 6-lowest) Cost saving (paper, storage, etc.) 2,1 Time saving (turnaround time) Improved commercial efficiency 2,3 2,3 Increased convenience Increased security 2,7 2,7 Note: All numbers represent average values 7
8 Several Challenges Still Need to be Overcome Despite the potential of the technology, the implementation of digital signature solutions also brings along challenges. A majority of companies have systems and processes designed around traditional methods of contractual communication. From an employee s desk to the archiving of signed documents, the adaption of existing applications or systems was regarded as a major issue in the interviews. Companies and institutions interested in adopting the technology are therefore highly dependent on trusted, easy-to-implement and convenient solutions that do not increase the complexity of workflows. Suppliers able to offer this important mixture of characteristics will likely have substantial competitive advantage in the market for digital signature. Furthermore, there is still an issue with the acceptance of business partners/customers. From the survey, however, it was clear that this acceptance is strongly dependent on the solutions offered to customers, meaning that a broad range of use cases guaranteeing ease of usage will raise the acceptance of natural and business partners. There was also the impression among respondents that implementing digital signature solutions will incur a high cost of investment. This argument is applicable in the short-term, but reduced costs offset the cost of investment generally in a very short time. The cost of a particular solution depends on the type of implementation. Cloud solutions result in lower implementation cost. The overall cost, however, depends on the solution s pricing model and on the frequency of usage. Certified could present a risk to digital signatures Certified is a service that is also aiming to ensure a secure transfer of data between sender and recipient by enabling s to be encrypted by the sender and decrypted by the receiver. In order to do so, the sender and the receiver need to have a certified account with a certified provider and software that is able to encrypt and decrypt s. If authenticity of the sender plays an important role in the transaction at hand, the certified can also be digitally signed (with a qualified digital signature). A major security issue with certified is that it is not based on an end-to-end encryption process, meaning that every that was encrypted by the sender is decrypted by both certified providers ( could be read or modified), representing a security issue that could be utilized by unauthorized parties. There is a possibility to enable end-to-end encryption, but only with additional encryption software. Compared to classic digital signature solutions, has security and convenience disadvantages as the standard model is not based on end-to-end encryption and because both the sender and the receiver must have a certified account. Figure 3: The primary challenges of Digital Signatures What do you see as the main challenges with regards to Digital Signature solutions? (1-highest; 6-lowest) Adaption of existing applications or systems 2,1 B2C, B2B acceptance Investment / implementation cost 2,8 2,8 Legal issues 3,0 Security issues 3,3 Note: All numbers represent average values 8
9 New Legislation will Further Promote the Use of E-signatures European legislation is predominantly based on Directive 1999/93/EC, which stipulates common obligations for certification service providers and common rules on liability and cooperative mechanisms in order to secure trans-border recognition of signatures and certificates throughout the European Community. The Directive addresses three forms of digital signatures: simple, advanced and qualified digital signature. A new EU Regulation on electronic identification and trust services for electronic transactions in the internal market is expected to be implemented in 2014, in order to consolidate the use of digital identification and signatures throughout the European Union. Key cornerstones of new EU regulation include the removal of existing barriers to delivering a comprehensive cross-border and cross-sector framework for secure, trustworthy and easy-to-use electronic transactions, as well as the potential to enable cloud signatures to achieve the highest level of security. Full cloud-based signatures will be able to be qualified once some final requirements are met. The industry expert interviews conducted by Arthur D. Little confirmed the general impression that while the law is clearly defined, it is not yet transparent to the general public, creating challenges to the potential of the technology. 9
10 The Digital Signature Market is Highly Fragmented and Dynamic To create a digital signature, it is necessary to have a secure environment, where the digital certificates needed to perform the digital signature are managed (issued, potentially stored, and utilized). This environment is called Public-Key-Infrastructure (PKI) and can either be locally managed in-house by the service issuer or can be externally managed by a cloud solution provider and accessed over the internet. In both cases, the service issuer, such as a bank, is offering the service to the end-user; either the token or other device where the certificate is stored is handed over to the end-user or the end-user is forced by the bank to sign via the cloud. The parties involved in the implementation and application phases of digital signature solutions can be seen in full detail in the graph below. The digital signature market in Europe is currently small, highly fragmented and dynamic. There are new players with new technologies, established players that focus only on the signature market and players from other industries that are trying to diversify. There are both European players, such as Opentrust and D-Trust, and American players trying to enter the European market, such as Adobe Echosign, ARX CoSign or DocuSign, which has already offices in the UK since three years. In order to facilitate their market entry in Europe, some of the US players have partnered with local players; Opentrust was selected by DocuSign as their European partner to jointly create a new digital sig nature solution, coupling EU legal compliancy and ease of use. In order to highlight the complexity of the market and to give a comprehensive overview of the main actors, typologies have been identified and characterized using a bottom-up investigative approach. Fifteen main suppliers of digital signature solutions active on the European market have been assessed based on the chosen typologies. n n User and company convenience: High user convenience means that the customer is able to process signatures from any computer, tablet or smart phone, no external devices (hardware token/ e-id card) are needed and there is no need to install any software (SaaS). This high degree of convenience means that no internal PKI is needed, archiving (Evidence Management) is outsourced and there is no need to install any software (SaaS). n n Breadth of use cases guaranteeing legal validity: High breadth of use cases guaranteeing legal validity (supported by QES, or at least AES, based on qualified certificate), means the digital signature solutions offered to the customer enable many use cases supported by a certified supplier having the status of trusted third party. Figure 4: The Digital Signature value chain Local digital signature solution (local server-based) In-house managed digital signature Security provider Service issuer End user Solution integrator Provider of technical modules e.g., provider of smart cards, PKI or signature software Integrator of technical modules e.g., company integrating PKI at a bank Issuer of services to end-users e.g., bank offering a customer to sign a loan agreement by issuing a token User of digital signature solution e.g., customer or employee performing a digital signature with a token External digital signature solution (cloud-based) Cloud solution provider Service issuer End user Cloud-based external managed process in order to use digital services PKI and other software are offered over the internet (SaaS) e.g., security provider offering cloud solution including a PKI and other software Issuer of services to end-users e.g., bank offering a customer to sign a loan agreement via cloud User of digital signature solution e.g., customer or employee performing a digital signature via cloud Source: Arthur D. Little 10
11 Figure 5: The Digital Signature market High user and company convenience Rising stars On-the-fly champions Low breadth of use cases guaranteeing legal validity High breadth of use cases guaranteeing legal validity Niche vendors Closed systems specialists Source: Arthur D. Little Low user and company convenience Based on the defined dimensions we have identified four main typologies of suppliers: non-the-fly n champions n n Closed systems specialists nniche n vendors nrising n stars On-the-fly champions are suppliers offering highly convenient solutions for customers, such as financial services companies, banks, or other highly regulated industries, which by the nature of their work require lots of references and certifications to guarantee legal validity of digital signature. In a market where customer-friendly solutions (SaaS) are the key to success, onthe-fly champions are the most adaptable to customer needs and also have the highest legal validity of provided solutions. The clear leader among on-the-fly champions in Europe in both B2C and B2B is the French supplier, Opentrust, the inventor of offline and cloud signatures (cloud system certified ETSI TS , ETSI TS and TüvIT). Positioned as an online notary (or trusted party) and having jurisprudence in its favor, Opentrust offers legally valid digital signature solutions with a high user and company convenience. Closed systems specialists vendors offer non-cloud based solutions for medium and large companies with many customer interactions and a broad range of internal processes requiring the use of digital signature and who prefer an internal management of the digital signature solutions. Companies already having internal PKI systems and already using badges with certificates inside can reuse these certificates, however they need to manage the PKI system and the solution is strongly dependent of the operating systems and web browsers, which all evolve quite often. The Spanish player, SafeLayer, has an established presence on the European market especially as a provider of digital signature solutions for financial institutions and public administrations, which demand many legally valid use cases as well as solutions based on their own server, rather than cloud based, due to the high level of confidential data. Niche vendors are suppliers offering internal solutions for smaller customers, not requiring many use cases or end user interactions. The solutions are not compatible with multi-chael / multi-device strategy, making the user experience less rich and interactive, however offering the advantage of internal management of the solution. The German player, StepOver, is a niche vendor providing both digital signature software, but also hardware components; there are 100,000 StepOver signature pads already in use. StepOver is the strong partner for smaller companies, preferring an internal management of their digital signature solutions. Rising stars are small suppliers offering cloud-based, convenient solutions, but with a limited amount of use cases with no EU legal value, but they have the potential to become the next onthe-fly-champions, but they still have a long way to go in order to get certified (ETSI TS 101, 102 etc.), to get on the EU trusted list of verifiable certification authorities and to build a customer base. For example, the US-based digital signature provider, ARX CoSign, is still a small player on the European market. Offering user-convenient solutions, but with no EU legal value, CoSign needs further certifications in order to increase the legal validity of its products and thus its European customer base. 11
12 Use Cases Provide Insight into the Practical Application of Digital Signatures Digital signatures can be applied in various workflows almost in every economic sector. Use cases embrace any kind of com munication where a declaration of intent combined with authentication of the parties involved is needed or required by law. Beyond eid services, which according to secondary research have not yet been very successful due to the low usability of the overall solution, the real market belongs to cloud-based digital signatures due to the convenience of the solution; the customers can view the contract, tax return, import or export duties, etc. on any device - whether PC, tablet or phone - get sms for authentication and then sign with no need for any special hardware or software. For the purposes of this report, we have used the following segmentation for digital signatures: nbusiness-to-business n (B2B) nbusiness-to-customer n (B2C) ngovernment. n The use cases further distinguish between remote and face-toface transactions. nremote: n the signatory is signing the document without a physical presence of a representative of the service-offering company (e.g. bank); authentication is also done by a remote method (e.g. one time password, sms, etc.) nface-to-face: n the signatory is signing the document with the physical presence of a representative of the serviceoffering company; this representative also authenticates the signatory (e.g. against a passport or ID document). Common use cases in B2B in the number of companies that are already transforming into digital companies or plaing to do so. Furthermore, it is observed that the acceptance of the technology is high in the B2B segment, as technologically advanced business partners are seen as role models. Remote Online subscriptions n n SEPA SDD mandate management naccount n creations Common use cases in B2C Face-to-face n n Contract signing on tablets in branches n n Contract signing on tablets by retailers and distributors (e.g. loans, insurance) The applied use cases in B2C depend very much on the legal validity and the overall customer acceptance of such technologies, which varies among different markets. Industries that are generally pioneers in offering these solutions to endusers are the delivery, banking and the insurance industry. Common use cases in Government Online subscriptions n n SEPA SDD mandate management naccount n creations Remote and Face-to-face n n Contract signing on tablets in branches n n Contract signing on tablets by retailers and distributors (e.g. loans, insurance) Remote n n Internal management of documents n n Supplier contract management n n Customer contract management n n Human resources contract management Face-to-face ncontract n signing through roaming sales (e.g. insurance, corporate finance) Governments are generally the main drivers for the crossindustry diffusion of the technology in Europe. Pressure to decrease costs is forcing many governments to think about making their processes leaner, while also guaranteeing security for sensitive commercial and personal data. Many governments in Europe offer or even oblige companies or citizens to communicate with them in a digital way. From the interviews conducted, current project requests and additional research Arthur D. Little recognizes a steep increase 12
13 Credit Agricole Consumer Finance Case Study 2 2 The following case study on Credit Agricole Consumer Finance was prepared by Arthur D. Little, in collaboration with Credit Agricole s digital signature supplier, Opentrust, a leading provider of on-the-fly digital signature solutions in Europe in both B2B and B2C. Company overview Main drivers for deployment Concept of digital solution Areas of application Benefits gained Challenges Main criteria for supplier choice Key considerations when choosing supplier Crédit Agricole Consumer Finance is a major consumer credit provider in France and in Europe Products: Financial products and services (direct sales, point-of-sale financing, e-commerce, partnerships) Operating in 22 countries Customers expected modernization of workflows and products Reduce cost Operating in 22 countries Face-to-face transactions (B2B in France, B2C in Italy, other countries following in the next years) No internal usage so far (secure own authentication available already) B2B2C transactions, with the objective to include digital signature in the applications of Credit Agricole partners (e.g. put the digital signature in the checkout of an e-commerce website) Increase of customer journey - Customer satisfaction due to being perceived as iovative Lower cost expected in the next years compared to paper-based approach ( will definitely pay off in the near future ) Took time to guarantee a good customer journey (the whole workflow not only digital signing had to be transformed) Clarification of legal validity needed effort (legal advisory was needed) High initial cost to adapt industrial process Legally valid solution Collaborative partnership Technical expertise Legal validity of solution and legal advisory by supplier possible Standardized solution for a European-wide deployment 2 Information gained through interview with Credit Agricole/CA Consumer Finance - representative 13
14 Conclusion The technology of digital signature will be present in many areas of our daily life where confidentiality is involved. The technology brings higher business efficiency and cost savings, and will be increasingly adopted as a communication tool by business partners, customers and public authorities. As for every relatively new technology, hurdles have to be overcome, such as the ease of integration and alignment with existing workflows, the business case calculation as well as the lack of transparency and often misunderstanding of the legal situation. With the new EU regulation expected to be implemented this year promoting the overall legal validity as well as acceptance of cloud-based solutions, there are already very promising signs that authorities and the supplier industry are overcoming these challenges. As the market demands a quick return on investment and a solution that is facilitating workflows, full or partly cloud-based solutions are expected to take a major part of the digital signature solution market in the future. Those who realize the potential of such solutions now will be able to create significant cost advantage, as well as better maintain and expand their customer base due to the higher convenience of these solutions. 14
15 Contacts If you would like more information or to arrange an informal discussion on the issues raised here and how they affect your business, please contact: Austria Karim Taga Italy Giancarlo Agresti Singapore Yuma Ito Belgium Gregory Pankert Japan Shinichi Akayama Spain Jesus Portal China Antoine Doyon Korea Kevin Lee Switzerland Clemens Schwaiger Czech Republic Dean Brabec Latin America Vincenzo Basile UK Richard Swinford France Didier Levy Middle East / Malaysia Thomas Kuruvilla [email protected] USA John Brean [email protected] Germany Michael Opitz [email protected] The Netherlands Martijn Eikelenboom [email protected] India Srini Srinivasan [email protected] Nordic Martin Glauma [email protected]
16 Arthur D. Little As the world s first consultancy, Arthur D. Little has been at the forefront of iovation for more than 125 years. We are acknowledged as a thought leader in linking strategy, technology and iovation. Our consultants consistently develop enduring next generation solutions to master our clients business complexity and to deliver sustainable results suited to the economic reality of each of our clients. Arthur D. Little has offices in the most important business cities around the world. We are proud to serve many of the Fortune 500 companies globally, in addition to other leading firms and public sector organizations. For further information please visit Copyright Arthur D. Little All rights reserved.
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST [email protected]
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Electronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta [email protected] Content
UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction
legislative standards on electronic communications and electronic signatures: an introduction Luca Castellani Legal Officer secretariat International harmonization of e-commerce law Model Law on Electronic
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
IAS2. ets Market analysis
IAS2 Study to support the implementation of a pan-european framework on electronic identification and trust services for electronic transactions in the internal market SMART 2012/0001 ets Market analysis
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Automation for Electronic Forms, Documents and Business Records (NA)
Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
Understanding E-Signatures: A Beginner s Guide
Understanding E-Signatures: A Beginner s Guide Content Summary 1 Overview 2 Technology / Terminology Electronic signatures have seen significant adoption in the past decade within insurance, lending, government
How To Control A Record System
Thermo Scientific Qtegra Intelligent Scientific Data Solution (ISDS) Software for 21 CFR Part 11 Compliant Laboratories Technical Note 43106 Key Words Compliance, Electronic Records, 21 CFR Part 11 Goal
Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for
Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with
Adobe PDF for electronic records
White Paper Adobe PDF for electronic records Digital signatures and PDF combine for definitive electronic records and transactions Contents 1 PDF and electronic records 2 Digital certification 3 Validating
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Demystifying Digital Signature Usage for Global Business
WHITE PAPER Demystifying Digital Signature Usage for Global Business Summary There are many applications of electronic signature spanning from simple consumer click to agree to multipart business contract
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM
W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,
OB10 - Digital Signing and Verification
Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
FAQs for Two-factor Authentication
FAQs for Two-factor Authentication Two-factor Authentication 1. What is two-factor authentication? Two-factor authentication is an authentication scheme that increases online security by relying on a combination
The Electronic Signature Market Is Poised to Take Off
G00234939 The Electronic Signature Market Is Poised to Take Off Published: 21 May 2012 Analyst(s): Gregg Kreizman Growth in the e-signature market is becoming viral, and there are significant benefits
How To Manage An Ip Telephony Service For A Business
Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,
Signicat white paper. Signicat Solutions. This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08
Signicat white paper Signicat Solutions This document introduces the Signicat solutions for digital identities and electronic signatures 2015-08 Version 1.1 2015-08-20 Disclaimer Please note that this
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
AlphaTrust PRONTO Enterprise Platform Product Overview
AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that
http://www.arx.com/about/press-room/interviews/nacho-alamillo-digital-signature-expert
1 de 7 16/06/2014 9:48 Contact Us Search Home (http://www.arx.com) About (http://www.arx.com/about/) Media (http://www.arx.com/about/press-room/) Interviews (http://www.arx.com/about/press-room/interviews/)
Transaction Security. Training Academy
Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
International Compliance
YOUR FREE COPY - NEW - Additional countries outside European Union LEGAL WHITE PAPER International Compliance Legal requirements international einvoicing European Union & Selected Countries Worldwide International
UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
Advanced Card Systems Ltd.
Issue Date: 17 Jan 2007 Publication: Frost & Sullivan (http://www.frost.com/prod/servlet/market-insight-top.pag?docid=92710322) By Jafizwaty Ishahak, Program Manager, Smart Cards and Auto ID, APAC Mr.
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
SSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication
Why Use Electronic Transactions Instead of Paper? Electronic Signatures, Identity Credentialing, Digital Timestamps and Content Authentication Introduction By allowing the exchange of information more
Qualified mobile electronic signatures: Possible, but worth a try?
Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)
Future directions of the AusCERT Certificate Service
Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication
Best prac*ces in Cer*fying and Signing PDFs
over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
PostFiles. The file sharing and synchronization solution dedicated to professionals. www.oodrive.com
PostFiles The file sharing and synchronization solution dedicated to professionals www.oodrive.com Share all file types, regardless of size or format. Synchronize and read files across several devices.
Digital Signature Application
Department of Science and Technology Republic of South Africa Specification Digital Signature Application 1. INTRODUCTION The Department of Science and Technology (DST) has 100 employees in Pretoria and
CRESCENDO SERIES Smart Cards. Smart Card Solutions
CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to
European Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
Cloud-based Workflows & Infrastructures for Graphic Communications
A Questex Company Cloud-based Workflows & Infrastructures for Graphic Communications Production Printing & Media C l o u d - b a s e d W o r k f l o w s & I n f r a s t r u c t u r e s f o r G r a p h
Secure file sharing and collaborative working solution
Secure file sharing and collaborative working solution Collaborate efficiently and in real time with nomad collaborators, subsidiaries, customers, service providers or partners. Make your files available
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Digital Signatures The Law and Best Practices for Compliance. January 2014
Digital Signatures The Law and Best Practices for Compliance January 2014 Electronic/Digital Signature Legislation Disclaimer: ARX is not is not a law firm and does not provide legal advice. We make no
BoardNox. Secure file sharing solution for Executive Committees and Boards of Directors. www.oodrive.com
BoardNox Secure file sharing solution for Executive Committees and Boards of Directors www.oodrive.com BoardNox Organize meetings (dates, participants, speakers, venues and subjects) Share documents on
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Finger Vein digital biometric signature: use cases
Finger Vein digital biometric signature: use cases Arkadiusz Buroń Presales & Account Director Information Systems Group Serock, 2015-09-23 Agenda 1. Introduction to Finger Vein technology 2. Digital biometric
ID Certificates (SMIME)
ID Certificates (SMIME) Reliability on the Internet Technology, security and usage www.certum.eu CONTENTS Introduction I. ID Certificates in a nutshell... 1. What is an ID Certificate?... 2. What is a
Business white paper Mobile payments
Business white paper Mobile payments Setting standards and gaining customer loyalty Business white paper Page 2 Mobile payments With the rapid development of electronic systems and technology, the adoption
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1
Zentrum für sichere Informationstechnologie Austria Secure Information Technology Center Austria A-1030 Wien, Seidlgasse 22 / 9 Tel.: (+43 1) 503 19 63 0 Fax: (+43 1) 503 19 63 66 A-8010 Graz, Inffeldgasse
In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION
In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), the Minister of Telecommunications and Information Society hereby promulgates REGULATION
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
ComSignTrust e-signing Solutions
ComSignTrust e-signing Solutions Agenda Comda group introduction Our e-signing solutions e-idas central signing compliance ComSignTrust's Icon government clients Other success stories 2 ComSignTrust company
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
ELECTRONIC SIGNATURES FACTSHEET
ELECTRONIC SIGNATURES FACTSHEET Electronic signatures mean that you can exchange information with others electronically and securely safe in the knowledge that everyone is who they claim to be and that
PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures
PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures PKI Project Title Digital Signatures for ClinPhone Organisation concerned ClinPhone
Deutsche Bank Global Transaction Banking. Securities Services. Overview
Deutsche Bank Global Transaction Banking Direct Securities Services Securities Services Overview Finding the right custodian with a long-term commitment to supporting its clients business is critical for
WE MAKE SECURITY WORK
WE MAKE SECURITY WORK Identity Management in action isecure Product family Introduction Infrasec Sweden AB was founded in 2002. Since our start, we have focused on in-house developed security products
Baltimore UniCERT. www.baltimore.com. the world s leading PKI. global e security
TM the world s leading PKI www.baltimore.com global e security Bringing Real Business On-Line The Internet is now forming a key part of organizations operating strategy. Although most companies accept
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Online E-Signing. Send and Sign Documents on the Internet Anywhere
Online E-Signing Send and Sign Documents on the Internet Anywhere Maximising the value of digital transformation is important in most industries and critical for survival against competition for some.
10 Tips for Selecting the Best Digital Signature Solution
10 Tips for Selecting the Best Digital Signature Solution Avoid the Pitfalls when transitioning from paper-based to electronic signatures Sept 2007 1 Introduction As the traditional paper-based world gives
E-Invoicing / E-Billing. International Market Overview & Forecast. Bruno Koch February 2013
E-Invoicing / E-Billing International Market Overview & Forecast Bruno Koch February 2013 Global overview page 2 International E-Invoicing Market 2013 Leaders Average Developing Laggards 11/02/2013 Bruno
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS
CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS Please fill in the form using BLOCK CAPITALS. All fields are mandatory. 1 1. SUBSCRIBER
ICT Industry in Europe. Outsourcing Fuels Business Growth
ICT Industry in Europe. Outsourcing Fuels Business Growth 1 CONTENTS Introduction... 3 Implications of owning own IT infrastructure Drivers to outsourcing IT nearshoring to pick up in 2014 Risks of outsourcing
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
Inside Electronic Signature APIs
Inside Electronic Signature APIs 7/20/2011 Adam DuVander Executive Editor Wendell Santos Web Services Analyst Sponsored by DocuSign Table of Contents Contents Executive Summary... 3 Methodology... 3 Provider
Comparative Domestic and International EHR Adoption
Comparative Domestic and International EHR Adoption October 4, 2010 Lydon Neumann Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Review of 1. Connected IT Health 2. Market
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
A RE T HE U.S. CHIP RULES ENOUGH?
August 2015 A RE T HE U.S. CHIP RULES ENOUGH? A longer term view of security and the payments landscape is needed. Abstract: The United States is finally modernizing its card payment systems and confronting
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
Making Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
