European Federated Validation Service Study. Solution Profile Trustweaver on Demand

Size: px
Start display at page:

Download "European Federated Validation Service Study. Solution Profile Trustweaver on Demand"

Transcription

1 European Federated Validation Service Study Solution Profile Trustweaver on Demand

2 This report / paper was prepared for the IDABC programme by: Author s name: Indicated in the solution profile below, under contact information Coordinated by: Hans Graux (time.lex), Christian Staffe (Siemens), Eric Meyvis (Siemens) Contract No. 1, Framework contract ENTR/05/58-SECURITY, Specific contract N 14 Disclaimer The views expressed in this document are purely those of the writer and may not, in any circumstances, be interpreted as stating an official position of the European Commission. The European Commission does not guarantee the accuracy of the information included in this study, nor does it accept any responsibility for any use thereof. Reference herein to any specific products, specifications, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favouring by the European Commission. All care has been taken by the author to ensure that s/he has obtained, where necessary, permission to use any parts of manuscripts including illustrations, maps, and graphs, on which intellectual property rights already exist from the titular holder(s) of such rights or from her/his or their legal representative. This paper can be downloaded from the IDABC website: European Communities, 2009 Reproduction is authorised, except for commercial purposes, provided the source is acknowledged. 2

3 Executive summary The European Federated Validation Service (EFVS) Study was initiated by IDABC in order to assess the feasibility of specific measures to ensure the availability of a European scale federated electronic signature verification functionality. As a first step in the EFVS Study, information has been collected on twenty existing solutions that already provide all or some of the functionalities associated with European signature verification functionality, or that could provide valuable insights on how such an EFVS could be organised. This has been done by drafting standardised profiles of the identified solutions, focusing specifically on how each of these solutions (a) determine the validity of signature certificates; (b) verify electronic signatures created using these certificates; and (c) provide specific guarantees to their customers on the outcomes of these processes. The present document contains the solution profile for: Trustweaver on Demand. 3

4 Table of Contents EXECUTIVE SUMMARY 3 1 DOCUMENTS APPLICABLE DOCUMENTS REFERENCE DOCUMENTS 5 2 GLOSSARY DEFINITIONS ACRONYMS 8 3 SOLUTION PROFILE TRUSTWEAVER ON DEMAND 10 4

5 1 Documents 1.1 Applicable Documents [AD1] Framework Contract ENTR/05/58-SECURITY 1.2 Reference Documents [RD1] [RD2] [RD3] Project Management and Quality Plan (EFVS SC14 PMQP) DIRECTIVE 1999/93/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 1999 on a Community framework for electronic signatures n.pdf Preliminary Study on Mutual Recognition of esignatures for egovernment applications 5

6 2 Glossary 2.1 Definitions In the course of this report, a number of key notions are frequently referred to. To avoid any ambiguity, the following definitions apply to these notions and should also be used by the correspondents. o Entity: anyone or anything that is characterised through the measurement of its attributes in an eidm system. This includes natural persons, legal persons and associations without legal personality; it includes both nationals and non-nationals of any given country. o eidm system: the organisational and technical infrastructure used for the definition, designation and administration of identity attributes of entities. This Profile will only elaborate on eidm systems that are considered a key part of the national eidm strategy. Decentralised solutions (state/region/province/commune ) can be included in the scope of this Profile if they are considered a key part of the national eidm strategy. o eidm token (or token ): any hardware or software or combination thereof that contains credentials, i.e. information attesting to the integrity of identity attributes. Examples include smart cards/usb sticks/cell phones containing PKI certificates, o Authentication 1 : the corroboration of the claimed identity of an entity and a set of its observed attributes. (i.e. the notion is used as a synonym of entity authentication ). o Authorisation: the process of determining, by evaluation of applicable permissions, whether an authenticated entity is allowed to have access to a particular resource. o Unique identifiers: an attribute or a set of attributes of an entity which uniquely identifies the entity within a certain context. Examples may include national numbers, certificate numbers, etc. o Official registers: data collections held and maintained by public authorities, in which the identity attributes of a clearly defined subset of entities is managed, and to which a particular legal of factual trust is attached (i.e. which are generally assumed to be correct). This includes National Registers, tax registers, company registers, etc. o egovernment application: any interactive public service using electronic means which is offered entirely or partially by or on the authority of a public administration, for the mutual 1 For the purposes of this Profile, the notion of authentication is considered to be synonymous with entity authentication, as opposed to data authentication. The notion of identification should be avoided to avoid confusion. 6

7 benefit of the end user (which may include citizens, legal persons and/or other administrations) and the public administration. Any form of electronic service (including stand-alone software, web applications, and proprietary interfaces offered locally (e.g. at a local office counter using an electronic device)) can be considered an egovernment application, provided that a certain degree of interactivity is included. Interactivity requires that a transaction between the parties must be involved; one-way communication by a public administration (such as the publication of standardised forms on a website) does not suffice. o esignature: data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication with regard to this data. Note that this also includes non-pki solutions. o Advanced electronic signature: an electronic signature which meets the following requirements: (a) it is uniquely linked to the signatory; (b) it is capable of identifying the signatory; (c) it is created using means that the signatory can maintain under his sole control; and (d) it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable; Again, this definition may cover non-pki solutions. o Qualified electronic signature: advanced electronic signatures which are based on a qualified certificate and which are created by a secure-signature-creation device, as defined in the esignatures Directive 2. o Validation: the corroboration of whether an esignature was valid at the time of signing. 2 See 7

8 2.2 Acronyms A2A...Administration to Administration A2B...Administration to Businesses A2C...Administration to Citizens CA...Certification Authority CRL...Certificate Revocation Lists CSP...Certificate Service Provider eid...electronic Identity eidm...electronic Identity Management IAM...Identity and Authentication Management IDM...Identity Management OCSP...Online Certificate Status Protocol OTP...One-Time Password PKCS...Public-Key Cryptography Standards PKI...Public Key Infrastructure SA...Supervision Authority SOAP...Simple Object Access Protocol SCVP...Server-based Certificate Validation Protocol SSCD...Secure Signature Creation Device USB...Universal Serial Bus TTP...Trusted Third Party XAdES...XML Advanced Electronic Signature XML...eXtensible Markup Language XML-DSIG...XML Digital Signature 8

9 9

10 3 Solution Profile Trustweaver on Demand General identification information Name and organisation The validation service is part of TrustWeaver On Demand, which is operated by TrustWeaver AB. Reference (on-line source) TrustWeaver s public web site is available at: TrustWeaver s repository is available at: At this repository site, it is possible to request an account, and then download all documentation of TrustWeaver On Demand. Contact information Johan Borendal johan.borendal@trustweaver.com Phone: Fax: Address: TrustWeaver AB, Wallingatan 12, Stockholm, Sweden 10

11 Scope of the solution Services offered (What services does the solution offer to a relying party? This should include most notably the three basic services above validation of certificates, verification of the signature, and ensuring trustworthiness and legal liability but may also cover additional services e.g. semantic services, archiving of documents/signatures, maintenance, time stamping, security/reliability metrics for the security level of the signature and the certificate, Services that are not currently available but which are planned for the future may also be indicated. ) Overview of TrustWeaver On Demand TrustWeaver On Demand is a comprehensive security compliance service. It offers support for a wide range of signing and validation mechanisms that are legally recognized by local tax authorities in a broad range of countries. Relying upon a modern Services Oriented Architecture (SOA), applications such as EAI-systems, archiving systems and B2B service providers ( hubs ) can rapidly integrate TrustWeaver On Demand in order to apply and validate electronic signatures. TrustWeaver On Demand s unique features including B2B-strength support for multiple certificates and a variety of signature formats can be mixed and matched in order to offer a high level of local recognition of electronic signatures for large, heterogeneous groups of businesses. 11

12 The following services and tools are provided by TrustWeaver On Demand: Signatory services: Sign, validate, timestamp, package This function applies the required type of digital signature(s) to documents depending on configuration (e.g. country parameters). It supports software-based (in EU terms: Advanced) electronic signatures and a variety of hardware-based (in EU terms: Qualified) electronic signatures. Multiple hardware Secure Creation Signature Devices (SSCDs) are supported, over which signing transactions can be load-balanced in order to increase performance. The signing function also normally adds certificate validity information and time-stamps. Relying party services: Validate, timestamp, package This function validates signatures, again possibly based on country parameters to achieve compliance with local requirements, when receiving a signed document. It supports multiple validation mechanisms and protocols, which allows the receiver to accept signatures based on certificates from a large number of CAs. Audit tools: Revalidate archived signed/validated document This function re-validates stored and signed document. For signatories, re-validation is based on revocation and certificate data that was created at the time of signing. For relying parties, it is the data 12

13 created during invoice validation that is the basis for re-validation. Provided that the archived documents (in particular e-invoices) contain signatures with time-stamped revocation and certificate data, the verification process is carried out without any dependencies on online validation services. Archive time-stamping services: Time-stamping using an Italian accredited TSA Due to Italian tax regulations, all tax-relevant documents need to be time-stamped by an accredited Italian TSA and signed with a qualified electronic signature within a maximum 15 days after they were received and archived. TrustWeaver On Demand includes mechanisms to perform these activities. The functions above support multiple signature formats. TrustWeaver On Demand also supports a number of input document formats allowing embedded signatures such as various XML formats and PDFs. The solution also allows any document to be signed using enveloping technology. Such enveloping signatures encapsulate the data to be signed, and the signatures typically have the formats attached CAdES-T/A 3 or S/MIME including CAdES-T/A. Detailed description of the Signature Validation service (part of the relying party service) Validation of signed documents is performed according to the following process: 1. The validation client creates a Web Services validation request. This validation request includes the signed document, sender/receiver tags, input signature format, and requested output data format. This Web Services validation request is sent over serverauthenticated SSL 4 to the Signature Validation service. 2. The signature(s) cryptographically verified according to conventional algorithms. 3. The signing certificate(s) is verified with respect to the CA s signature, as well as time and revocation status; when applicable, external validation services are used. 4. The signed document is validated on the business document level. This is achieved by the compliance logic checking that the sender/receiver tags match the country of the signing certificate(s). 5. The revocation and certificate data are time-stamped and embedded into the signature. If the signature envelope already contains such validation data from the sender, it is replaced with refreshed validation data. Also, the original document is parsed from the signature message. 6. Finally, the validation result, original document and embedded validation data are returned in the validate Web Services response. TrustWeaver On Demand supports two models for certificate validation: The shell validation model. In this model, the certificates are validated based on the current status of the CA-certificate. This is the default configuration for certificate validation in TrustWeaver On Demand. The chain validation model. In this model, the certificates are validated based on the status of the CA-certificate at the time when the certificate was issued. Hence, the CAcertificate may be revoked or expired at the time of validation, but validation will nevertheless succeed if the CA-certificate was valid when the certificate was issued. The chain model is widely adopted by CAs in Germany. Therefore the chain model is 13

14 configured in particular for the validation of German certificates. Specifically for use in e-invoicing, the legal requirements for validation of signed documents are outlined in TrustWeaver Compliance Map TM. Application domain (e.g. sector or application types) (Is the solution usable in any sector or application field (i.e. is it generic in scope), or is it currently limited to a specific sector, application or domain? If it is currently restricted, would it be possible to extend the solution to other sectors, applications or domains? What would need to be changed?) The principal application of TrustWeaver On Demand is currently the signing and validation of electronic invoices. In particular, the legal documentation i.e. TrustWeaver Compliance Map TM and optionally a legal design targets the legal instruments needed to validate e-invoices with respect to electronic signatures. Technically, however, TrustWeaver On Demand can be used for validating any signed document provided that the signature format and CA are supported by TrustWeaver On Demand. What may be subject to change, if needed, is the legal documentation required for validating other types of documents. If there is no need for any legal documentation for a certain type of signed documents, no changes are needed at all to TrustWeaver On Demand. CAs covered by the solution (How many CAs are presently covered by the solution, and which ones? Do they include CAs established in multiple countries or states?) CAs are supported in the following countries: Bulgaria, Cech Republic, Germany (2), Greece, Italy (2), Lithuania, Poland, Romania, Slovenia, Spain, Austria, France, Hungary, the Netherlands, Portugal and Switzerland. Information omitted at the solution owner's request. Extensibility of the solution (Can additional CAs be integrated into the solution? If so, are there restrictions? Have such extensions been done in the past yet, or are any extensions currently planned?) Yes, additional CAs can easily be integrated into TrustWeaver On Demand. Technically, there are no known restrictions with respect to adding CAs. Adding CAs to TrustWeaver On Demand is a well-proven process in TrustWeaver s release cycles, and more or less every product release has included support for one or more new CAs. In addition to the technical implementation, TrustWeaver performs an extensive legal process in close co-operation with local law firms to evaluate the applicable regulations in the countries where the CAs reside. 14

15 TrustWeaver is always open for receiving requests of new CAs and countries to be supported. The following countries will be added for e-invoicing compliance purposes based on existing CAs: Australia, Hong Kong, Iceland, New Zealand, Singapore, and United Arab Emirates. The final conclusions of legal research will drive the decision to add new CAs to the solution. Business model/cost model of the solution (How is the solution funded? Is it envisaged as a for-profit model? Who pays contributions, and for what type of services? What profits (if any) are made with the services provided by the solution? Upon request of the correspondent, any communicated price information or other commercially sensitive information will not be disclosed.) For electronic invoices, a transaction fee is used as the base commercial model. Information omitted at the solution owner's request The solution has not been designed to be offered on a non-profit basis, however different business models can lead to the provision for free or a nominal fee of relying party or audit services. Information omitted at the solution owner's request. 15

16 Technical approach Validation approach (Does the solution validate signature certificates, electronic signatures based on a hash value of the signed document(s), or signed documents with embedded signatures (attached signatures - enveloping or enveloped signatures detached signatures)? What is the maturity of the solution i.e. can it be classified as a known technical approach, such as a trusted list, bridge, or validation platform?) The current version of TrustWeaver On Demand, version 1.10, validates only documents with attached signatures and certificates. The attached signatures are enveloping in the cases of PKCS #7, CMS, CAdES-T/A, XAdES-T/A and S/MIME. The attached signatures are embedded (enveloped) in the cases of cxml with embedded XAdES-T/A and signed-pdf. TrustWeaver On Demand version 1.10 SP1 will support detached CMS signatures. With regard to certificates (How does the validation of certificates work based on OCSP, CRLs, or both? What certificate profiles are supported by the solution?) Both OCSP and CRLs are supported by TrustWeaver On Demand. The architecture of the Signature Validation service includes connectors to external CRL repositories and OCSPresponders. CRL repositories can either be accessed over LDAP or HTTP, while OCSPresponders are accessed using HTTP as the transport protocol. The retrieved revocation data, such as CRLs or OCSP responses, are used for checking the signing certificate s revocation status. The following certificate profiles are supported by TrustWeaver On Demand: ITU-T X.509, PKIX, and ETSI TS Qualified Certificate profile. The signing certificate is checked as follows: 1. The CA signature is cryptographically checked using the CA certificate. 2. The expiration date is checked. 3. The revocation status (at the time of the request) is checked against the CA's CRL or OCSP responder. 16

17 The CA certificate is validated as follows: 1. The CA signature is cryptographically checked using the root certificate. 2. The expiration date is checked. 3. When applicable, the CA certificate s revocation status is checked against the upperlevel s CA CRL or OCSP responder. With regard to signatures (What signature formats are supported by the solution - PKCS #7, CMS, XML signatures, PDF signatures, XAdES, CAdES, or others?) TrustWeaver On Demand supports a wide range of signature formats. The following signature formats are currently supported: CAdES-T/A, PKCS #7, CMS, S/MIME, XAdES-T/A, XMLsignature, XMLcon 5, and PDF-signature. By using appropriate combinations of those signature formats, cross-border document (in particular e-invoice) flows with double signatures and long term archiving using time-stamps can be ensured. The document and signature combinations currently recommended are outlined in the table below. Document type cxml PDF Recommended signature format cxml with enveloped XML signature(s) according to XAdES-A. 1. XMLcon with enveloped XAdES-A signatures. The PDF must be proper XML and e.g. BASE64 encoded. 2. S/MIME enveloping signature(s) according to CAdES-A. Input data must be MIME-encoded. 3. PDF with enveloped signatures according to CAdES-A. Other XML formats XMLcon with enveloped XAdES-A signatures. Other documents 1. XMLcon with enveloped XAdES-A signatures. Binary data must be proper XML and e.g. BASE64 encoded. 2. S/MIME enveloping signature(s) according to CAdES-A. Input data must be MIME-encoded. 3. PKCS #7 enveloping signature(s) according to CAdES-A. TrustWeaver is constantly adding more document formats as input data, and more signature formats as output data. 17

18 Multi-signatures (Is the solution capable of validating multiple signatures on a document? Does it support independent signatures (co-signatures) and/or overall countersignatures?) Yes, TrustWeaver On Demand has the capability of validating multiple signatures applied to one document. Independent signatures (co-signatures) are supported; counter-signatures are however not supported. Logging and auditing (Is the use of the solution logged, and if so, to what extent? Do users of the solution have the possibility to perform audits or to gain access to independent auditing reports?) All signing and validation calls are extensively logged by TrustWeaver On Demand. The following entries are logged: Operation Sign, Validate or ValidateArchive. Source client s SSL-certificate details and/or IP-address. InputType format of the data in the request. OutputType expected format of the processed data. JobType optional extension to the operation. SenderTag sender s country code. ReceiverTag receiver s country code. InDataHash hash of the data in the request. OutDataHash hash of the data in the response. The log files are transferred to a transaction database, where all entries are searchable. The log files mentioned above, plus the reverse proxy and switch logs, are reviewed daily. Any incident is reported and followed up immediately. All TrustWeaver On Demand activities are logged in Windows event viewer application log. Also, the system and security logs contain valuable information on the machine running TrustWeaver On Demand. When a critical event occurs, a notification is automatically triggered and sent via to a designated group of administrators. Such critical events can cover errors and warnings from TrustWeaver On Demand, the time synchronization service, the network load balancing service and the web server. In addition to these features, TrustWeaver On Demand is monitored by the data centre s 18

19 powerful host and service monitor tools. These tools monitors the network services, as well as host resources such as processor load, disk and memory usage, running processes, etc. In case of failures, SMS are sent out to the administrators. Finally, to measure availability, an independent monitoring service runs a transaction on TrustWeaver On Demand every five minutes from four different geographical locations. TrustWeaver On Demand is subject to SAS 70 Type II audits that are performed by PriceWaterhouseCoopers on a yearly basis. These audits are documented in a SAS 70 Type II report. Restrictions imposed on CAs (What technical requirements are imposed on CAs, e.g. with regard to standards, formats or certificate profiles that they need to adopt? This includes e.g. the inclusion of certain information in signature certificates that is necessary in specific sectors.) The CAs should support at least one of the following certificate profiles: ITU-T X.509, PKIX, and ETSI TS Qualified Certificate profile. In countries where Qualified Electronic Signatures are mandatory for a specific application (e.g. e-invoicing), the signing certificates should comply with the Qualified Certificate profile and the CA should be accredited by the appropriate authorization body. Usage of the solution by relying parties (How do relying parties use the solution? Are there software components which they need to integrate into their own systems, is it a web service, etc.) Information omitted at the solution owner's request. TrustWeaver On Demand is accessed over Web Services calls over client authenticated HTTPS. TrustWeaver provides sample code and extensive documentation to be used for integration with TrustWeaver On Demand using Web Services. Information omitted at the solution owner's request. Technical flexibility 19

20 (Given the technical characteristics outlined above, could the technical requirements of the solution be changed to increase its flexibility (e.g. by supporting other signature standards, validation methods, certificate profiles, etc...))? Yes, TrustWeaver On Demand s flexible architecture can easily be extended with more signature standards, validation methods and certificate profiles. Adding more such standards is an integral part of the TrustWeaver On Demand release project. More or less every TrustWeaver On Demand release introduces a new document format, signature format or certificate format. Status of the project/actual usage of the solution (What is the status of the project (e.g. in development, prototyped, in production, etc.). What is the actual usage of the solution (e.g. in terms of relying parties adopting the solution to validate electronic signatures) and what are the impacts of its use? How many transactions, how many certificates does it handle?) The solution has been in production since Many hundreds of end users access the solution for tens of millions of transactions annually. Information omitted at the solution owner's request. Legal approach Relationship with the CAs 6 (What requirements does a CA need to meet before being able to accede to the solution? Specifically, which processes and procedures have been foreseen to vet CAs? What kind of agreements are put in place with the CAs, and what are the main issues addressed in these agreements?) Depending on the application for which the service is used, applicable legal requirements concerning the CA in a specific country are carefully assessed in close co-operation with a local law firm. When a shortlist of CAs has been identified, TrustWeaver sends a questionnaire to these CAs with a list of technical and legal questions. The agreements settled with the CAs are mainly the agreements presented by the CA itself: enrolment forms, authorizations etc. In virtually all cases, those documents refer to the CA s CP/CPS, which in turn contains the service level terms which are the crucial issues when operating TrustWeaver On Demand with an integrated 20

21 CA. Relationship with the relying parties (How does a relying party get the right to use the solution? What kind of agreements are put in place in relation with the relying parties, and which services can be offered to the relying parties via these agreements?) The type of agreement with relying parties and the modalities of its formation depend on the individual circumstances including the type of application to be used. TrustWeaver offers an integrated service and the ambition to package the required agreements for each supported application. Reliability of the signature certificates (What procedures does the solution put in place to determine the reliability of signature certificates? Are certificate policies checked? Are supervision/accreditation schemes considered? Have specific security criteria been defined, and does the solution support multiple levels of reliability? If so, can the solution distinguish between qualified and nonqualified signature certificates?) In order to use TrustWeaver On Demand for automated validation purposes, a set of sender and receiver tags as ISO 3166 country codes for verification must be set. These verification tags in turn are connected to a certificate policy. Each validation request contains sender and receiver tags. The sender and receiver tags are explicitly included in the Web Services validate request as parameters. Those variables are matched against the available verification tags in the TrustWeaver On Demand configuration in order to identify a certificate policy. From this certificate policy, in turn, the appropriate CA certificate and revocation data can be obtained and used for validation of the signing certificate. If a document is signed with multiple signatures, each signature is verified independently from the other(s). The Signature Validation service s compliance logic ensures that the document is signed with an appropriate signature. Supervision, accreditation and security evaluations of the CA s are managed when the partnership with the CA is established. Legal value of the signatures (Can the solution make a statement on the legal value of signatures? If so, what factors are taken into account? If multiple degrees of validity are supported by the system (i.e. a statement on the reliability of the signature as a whole is provided), then how are these reliability levels defined and communicated to the relying party? Can the solution identify if a signature can be considered a qualified signature (i.e. if it is an advanced electronic signature based on a qualified certificate created by using a secure signature creation device, as defined in the esignatures Directive)? Finally, if the certificate policies contain restrictions on the use of the signatures (e.g. limitation to 21

22 transactions of a certain amount or exclusion of certain sectors), then are these restrictions taken into account when communicating the legal value of the signature?) The response below takes e-invoices as an example other applications can be addressed in similar ways using the same policy-driven logic to ensure legal validity and compliance of signed documents on different levels. TrustWeaver On Demand s validation logic is based on the TrustWeaver Compliance Map TM in conjunction with the compliance configuration. The compliance configuration is in turn constituted by a number of compliance items, where compliance is defined by the intersection of country x and country y. For country x and y, applicable certificate policies are configured as described in the question above. If country x requires a Qualified Electronic Signature created by a dedicated CA, this and only this CA will be able to validate the Qualified Electronic Signature. If country y requires an Advanced Electronic Signature created by a dedicated CA, this and only this CA will be able to validate the Advanced Electronic Signature. If both country x and y requires a dedicated CA to be used, the signature needs to be double, and both certificates must be validated as described above. Liability of the solution provider (What liability (if any) does the solution provider accept with regard to its services? Specifically, if the signatures rely on qualified certificates as defined under the European esignatures Directive (if this is applicable to the solution), then how does the solution address its liability for providing guarantees to the public in relation to such certificates?) TrustWeaver does not offer Certification-Service-Provider services and does not issue certificates to the public. The liability, whether based on legislation or private decisions, of supported CAs is determined in the CA s documentation and is part of the CA service parameters that TrustWeaver evaluates prior to supporting a CA. If TrustWeaver were to attract liability as a result of a CA breaching its contractual or legal obligations, TrustWeaver will seek appropriate recourse against the faulty CA. For liability aspects of the signing or validation services themselves, TrustWeaver typically works with industrial standard Service Level Agreements accepting comparatively high levels of liability. Quality of service and availability (Does the solution provide any guarantees with regard to the quality of its service (i.e. the reliability of the information it provides) and its availability to relying parties, other than already mentioned above?) TrustWeaver On Demand is operated in two highly secure data centres which are geographically separated, and is subject to a security policy which includes guidelines for maintenance, change management, disaster recovery, security and operations. The security policy is written to meet the demanding requirements defined by e.g. the German signature act and regulations. This section gives an overview of the security policy contents and the data centre operations with respect to TrustWeaver On Demand. 22

23 The data hosting centres where TrustWeaver On Demand is located provide a high level of physical security and related quality features: Information omitted at the solution owner's request. The quality of TrustWeaver On Demand operations are described extensively in the TrustWeaver On Demand service agreement which includes the service level and support terms. For example, 99.9% uptime of TrustWeaver On Demand is guaranteed in this agreement. Independence of the solution (Is the solution fully unaffiliated (legally unrelated) with all of the CAs that are integrated into the solution? If not, then how is trust created towards the relying party for affiliated CAs?) All signing CAs are legally unrelated to TrustWeaver. Compliance with the provisions of the esignatures Directive (Does the solution support signatures from CAs established in countries that are not subjected to the provisions of the esignatures Directive (Directive1999/93/EC)? If so, how are they integrated and how does the solution address their legal value?) All CAs currently supported by TrustWeaver On Demand are established in the European Union with one exception: Swisscom in Switzerland. The CAs in the European Union are subject to the provisions of the esignatures Directive (directive 1999/93/EC). TrustWeaver will in the future support other CAs, in addition to Swisscom, that are not established within the EU. For such CAs TrustWeaver will apply quality and regulatory compliance criteria that are required for a high level of recognition and legal compliance depending on the application used. This will be a case-by-case decision backed by local legal advice. As a general matter, local accreditation or certification in accordance with available public or voluntary standards will be an important factor in this assessment. Suitability of the solution at the European level Assessment of the solution owner 23

24 (Does the solution owner feel that the solution could be adapted to operate at the European level not applicable if the solution already functions at the European level?) TrustWeaver On Demand supports transactions (domestic and cross-border) in all EU Member States already today. TrustWeaver On Demand is extremely well adapted to operate at the European level. Currently 18 European CAs are supported by TrustWeaver On Demand, and for e-invoicing purposes additional 11 European countries rely upon those CAs. Issues to be addressed (Which issues does the solution owner feel would still need to be addressed before the solution could be made to operate at the European level?) For validation of externally signed documents, where a CA has been used that is currently not supported by TrustWeaver On Demand, support for this CA needs to be configured in TrustWeaver On Demand. The effort for doing so is estimated to be very low in most cases. A legal assessment may need to be part of this activity so as to ensure that relying parties will only get positive validations for signatures that meet minimum legal and commercial criteria the kinds and level of requirements for such assessments will depend on the circumstances such as the application for which TrustWeaver On Demand is used. Integration with other validation solutions (Is there any strategy to allow the solution to interoperate with other validation solutions, i.e. can the solution connect to other islands of trust?) TrustWeaver is currently running a project in order to significantly strengthen interoperability with other signature service providers and CAs. In the e-invoicing compliance market, which is TrustWeaver s main current focus, TrustWeaver On Demand will be interoperability tested with signatures created by external signature service providers. If or when needed, TrustWeaver On Demand will be integrated with islands of trust identified in such project. Market Impacts (How could the solution impact or influence the European market?) TrustWeaver On Demand is today by far the richest signature and validation/audit engine on the European Market. By integrating multiple levels of legal compliance and recognition validation and associated long-term auditability features, based on policy-driven and easily configurable parameters that can take into account transaction-specific requirements and features including applicable laws and industry-specific requirements, TrustWeaver On Demand has already enabled hundreds of companies of all sizes to transact effortlessly and with high degrees of legal 24

25 certainty over long periods of time for stored documents across the EU and beyond. TrustWeaver is open for broadening the scope of its services; validation of other signed documents may also be considered for the European market. Any other comments? (The solution owner can provide any other comments that (s)he feels were not adequately covered elsewhere) All cryptographic operations of TrustWeaver On Demand are performed in TrustWeaver SigG Library, which in turn is subject to a Manufacturer s Declaration which has been written in cooperation with T-Systems. The Manufacturer s Declaration has been approved by the German Bundesnetzagentur, and is published at TrustWeaver builds and provides solutions integrating legal, technical and process aspects through a multi-disciplinary team in which each person brings his or her unique experience to bear. Our legal team includes some of Europe s most experienced e-business and e-invoicing lawyers. With experience from organizations such as the International Chamber of Commerce, EU and the UN, they have a strong global network of contacts and references with key decision makers. Our multicultural team covers large parts of Europe directly and has established ongoing cooperation with expert tax and e business lawyers in other countries. Through their vast legal network, constant contacts with tax authorities and active participation in all relevant European standardization groups such as CEN and Fiscalis, TrustWeaver s team is always on top of the latest legal developments. We anticipate regulatory changes where these occur and ensure our customers systems use the right signature at any moment and can prove integrity, authenticity and trustworthiness of their data over very long periods of time without external dependencies. 25

26 26

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte

More information

Study on Mutual Recognition of esignatures: update of Country Profiles Analysis & assessment report

Study on Mutual Recognition of esignatures: update of Country Profiles Analysis & assessment report Study on Mutual Recognition of esignatures: update of Country Profiles This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Guy Lambert (Siemens), Brigitte

More information

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)

More information

Making Digital Signatures Work across National Borders

Making Digital Signatures Work across National Borders Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det

More information

Digital Signature Verification using Historic Data

Digital Signature Verification using Historic Data Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held

More information

UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction

UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction legislative standards on electronic communications and electronic signatures: an introduction Luca Castellani Legal Officer secretariat International harmonization of e-commerce law Model Law on Electronic

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

OB10 - Digital Signing and Verification

OB10 - Digital Signing and Verification Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply

More information

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification

ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of

More information

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex

Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex Submitted to the EC on 03/06/2012 COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex e-justice Communication via Online Data Exchange ICT PSP call identifier:

More information

International Compliance

International Compliance YOUR FREE COPY - NEW - Additional countries outside European Union LEGAL WHITE PAPER International Compliance Legal requirements international einvoicing European Union & Selected Countries Worldwide International

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves Electronic Signature István Zsolt BERTA istvan@berta.hu Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

NIST-Workshop 10 & 11 April 2013

NIST-Workshop 10 & 11 April 2013 NIST-Workshop 10 & 11 April 2013 EUROPEAN APPROACH TO OVERSIGHT OF "TRUST SERVICE PROVIDERS" Presented by Arno Fiedler, Member of European Telecommunications Standards Institute Electronic Signatures and

More information

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013 Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines

More information

TECHNICAL INTEROPERABILITY STANDARD

TECHNICAL INTEROPERABILITY STANDARD TECHNICAL INTEROPERABILITY STANDARD For the Spanish Public Administration E-Signature and Certificate Policy GOBIERNO DE ESPAÑA MINISTERIO DE HACIENDA Y ADMINISTRACIONES PÚBLICAS SECRETARÍA DE ESTADO DE

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate

More information

Digital Signing without the Headaches

Digital Signing without the Headaches Digital Signing without the Headaches Nick Pope 1 Juan Carlos Cruellas 2 1 Security & Standards Associates Grays, Essex, United Kingdom nickpope@secstan.com 2 Universitat Politècnica de Catalunya Barcelona,

More information

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

Long-term archiving of electronically signed documents in Hungary

Long-term archiving of electronically signed documents in Hungary Long-term archiving of electronically signed documents in Hungary Dr. István Zsolt BERTA, PhD, MBA, CISA Microsec Ltd. HUNGARY istvan.berta@microsec.hu www.e-szigno.hu http://www.e-szigno.hu Microsec Ltd.

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic

More information

Best prac*ces in Cer*fying and Signing PDFs

Best prac*ces in Cer*fying and Signing PDFs over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL

More information

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA

DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA Non-official translation DIRECTOR GENERAL OF THE LITHUANIAN ARCHIVES DEPARTMENT UNDER THE GOVERNMENT OF THE REPUBLIC OF LITHUANIA ORDER ON THE CONFIRMATION OF THE SPECIFICATION ADOC-V1.0 OF THE ELECTRONIC

More information

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation

More information

The Business Value of e-invoicing

The Business Value of e-invoicing STERLING COMMERCE WHITE PAPER The Business Value of e-invoicing A new look at the challenges, trends and opportunities in the global marketplace Table of Contents 3 Executive summary 4 Situation overview

More information

Number of relevant issues

Number of relevant issues Electronic signature Lecture 8 Number of relevant issues cryptography itself algorithms for signing documents key management generating keys, distribution, key revocation security policy certificates may

More information

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof, 28.8.2014 Official Journal of the European Union L 257/73 REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic

More information

OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services

OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services www.oasis-open.org OASIS Standard Digital Signature Services (DSS) Assures Authenticity of Data for Web Services Juan Carlos Cruellas UPC Spain Nick Pope Thales esecurity (Co-Chairs Chairs DSS Technical

More information

DECREE 132 of the National Security Authority. dated from 26 March 2009

DECREE 132 of the National Security Authority. dated from 26 March 2009 DECREE 132 of the National Security Authority dated from 26 March 2009 on the conditions for providing accredited certification services and requirements for an audit, the extent of an audit and the qualification

More information

PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL

PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL WHITE PAPER PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL CERTIFICATE REVOCATION CHECKING ON CISCO IOS SOFTWARE Introduction The support for x.509 digital

More information

Gandi CA Certification Practice Statement

Gandi CA Certification Practice Statement Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10

More information

26.3.2014 A7-0365/133

26.3.2014 A7-0365/133 26.3.2014 A7-0365/133 Amendment 133 Amalia Sartori on behalf of the Committee on Industry, Research and Energy Report A7-0365/2013 Marita Ulvskog Electronic identification and trust services for electronic

More information

ETSI TR 102 041 V1.1.1 (2002-02)

ETSI TR 102 041 V1.1.1 (2002-02) TR 102 041 V1.1.1 (2002-02) Technical Report Signature Policies Report 2 TR 102 041 V1.1.1 (2002-02) Reference DTR/SEC-004022 Keywords electronic signature, security 650 Route des Lucioles F-06921 Sophia

More information

StartCom Certification Authority

StartCom Certification Authority StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS ; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

PKI - current and future

PKI - current and future PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi

More information

White Paper. Digital signatures from the cloud Basics and Applications

White Paper. Digital signatures from the cloud Basics and Applications White Paper Digital signatures from the cloud Basics and Applications Contents Basics of digital signature...3 Electronic documents and signature...3 Electronic signature...3 Digital signature...4 Standards

More information

Statewatch Briefing ID Cards in the EU: Current state of play

Statewatch Briefing ID Cards in the EU: Current state of play Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

e-szigno Digital Signature Application

e-szigno Digital Signature Application MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

PostSignum CA Certification Policy applicable to qualified personal certificates

PostSignum CA Certification Policy applicable to qualified personal certificates PostSignum CA Certification Policy applicable to qualified personal certificates Version 3.0 7565 Page 1/60 TABLE OF CONTENTS 1 Introduction... 5 1.1 Review... 5 1.2 Name and clear specification of a document...

More information

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of

More information

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized

More information

Equens Certificate Policy

Equens Certificate Policy Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

ETSI TS 102 778-5 V1.1.1 (2009-07) Technical Specification

ETSI TS 102 778-5 V1.1.1 (2009-07) Technical Specification TS 102 778-5 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 5: PAdES for XML Content - Profiles for XAdES signatures

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

ARE THE POINTS OF SINGLE CONTACT TRULY MAKING THINGS EASIER FOR EUROPEAN COMPANIES?

ARE THE POINTS OF SINGLE CONTACT TRULY MAKING THINGS EASIER FOR EUROPEAN COMPANIES? ARE THE POINTS OF SINGLE CONTACT TRULY MAKING THINGS EASIER FOR EUROPEAN COMPANIES? SERVICES DIRECTIVE IMPLEMENTATION REPORT NOVEMBER 2011 EUROPEAN COMPANIES WANT WELL-FUNCTIONING POINTS OF SINGLE CONTACT

More information

ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com

ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com Version: 1.0 Date: 30 May 2012 Copyright 2012 Thales e-security Limited. All rights reserved.

More information

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.

QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0. QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.3 Effective Date: 20 April 2009 Version: 4.6 Copyright QuoVadis

More information

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic

FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,

More information

ONR CEN/TS 419241. Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) DRAFT ICS 35.240.

ONR CEN/TS 419241. Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) DRAFT ICS 35.240. ICS 35.240.99 DRAFT ONR CEN/TS 419241 Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) Sicherheitsanforderungen für Vertrauenswürdige Systeme, die Serversignaturen

More information

CERTIFICATE POLICY (CP) (For SSL, EV SSL, OSC and similar electronic certificates)

CERTIFICATE POLICY (CP) (For SSL, EV SSL, OSC and similar electronic certificates) (CP) (For SSL, EV SSL, OSC and similar electronic certificates) VERSION : 09 DATE : 01.12.2014 1. INTRODUCTION... 10 1.1. Overview... 10 1.2. Document Name and Identification... 11 1.3. Participants...

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Citizen CA Certification Practice statement

Citizen CA Certification Practice statement Citizen CA Certification Practice statement OID: 2.16.56.1.1.1.2.2 OID: 2.16.56.1.1.1.2.1 VERSION: 1.1 1/56 Table of Contents 1 INTRODUCTION 5 1.1 PRELIMINARY WARNING 5 1.1.1 Trusted Entities ruled by

More information

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic

More information

Certificate Path Validation

Certificate Path Validation Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security

More information

Guidelines for the use of electronic signature

Guidelines for the use of electronic signature Republic of Albania National Authority for Electronic Certification Guidelines for the use of electronic signature Guide Nr. 001 September 2011 Version 1.3 Guidelines for the use of electronic signature

More information

Electronic Archive Information System

Electronic Archive Information System 107 Electronic Archive Information System Saulius RAGAISIS a,1, Adomas BIRSTUNAS b, Antanas MITASIUNAS b and b Arunas STOCKUS a Software Engineering Department, Vilnius University, Lithuania b Computer

More information

X.509 Certificate Generator User Manual

X.509 Certificate Generator User Manual X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on

More information

Multiple electronic signatures on multiple documents

Multiple electronic signatures on multiple documents Multiple electronic signatures on multiple documents Antonio Lioy and Gianluca Ramunno Politecnico di Torino Dip. di Automatica e Informatica Torino (Italy) e-mail: lioy@polito.it, ramunno@polito.it web

More information

TC TrustCenter GmbH. Certification Practice Statement

TC TrustCenter GmbH. Certification Practice Statement TC TrustCenter GmbH Certification Practice Statement NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification Practice Statement is published in conformance

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Landscape of eid in Europe in 2013

Landscape of eid in Europe in 2013 Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information

More information

Legal Status of Qualified Electronic Signatures in Europe

Legal Status of Qualified Electronic Signatures in Europe Legal Status of Qualified Electronic Signatures in Europe Jos Dumortier Professor of Law - K.U.Leuven Lawfort Of Counsel - Bar of Brussels jos.dumortier@lawfort.be Abstract It is a common misunderstanding

More information

Service Description. 3SKey. Connectivity

Service Description. 3SKey. Connectivity Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey

More information

ETSI TR 103 123 V1.1.1 (2012-11)

ETSI TR 103 123 V1.1.1 (2012-11) TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123

More information

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points

Configuring DoD PKI. High-level for installing DoD PKI trust points. Details for installing DoD PKI trust points Configuring DoD PKI This document describes the procedures to configure an XML Firewall that is interoperable with the United Stated Department of Defense (DoD) Public Key Infrastructure (PKI). High-level

More information

E-Signatures and E-Procurement

E-Signatures and E-Procurement E-Signatures and E-Procurement Dr. Annette Rosenkötter Rechtsanwältin Dr. Anja Hoffmann Rechtsanwältin FPS Rechtsanwälte und Notare Brüssel, 15.06.2011 Dieser Bericht ist nur für den Empfänger bestimmt.

More information

ETSI TS 101 903 V1.3.2 (2006-03)

ETSI TS 101 903 V1.3.2 (2006-03) TS 101 903 V1.3.2 (2006-03) Technical Specification XML Advanced Electronic Signatures (XAdES) 2 TS 101 903 V1.3.2 (2006-03) Reference RTS/ESI-000034 Keywords e-commerce, electronic signature, security

More information

The Community Innovation Survey 2010 (CIS 2010)

The Community Innovation Survey 2010 (CIS 2010) The Community Innovation Survey 2010 (CIS 2010) THE HARMONISED SURVEY QUESTIONNAIRE The Community Innovation Survey 2010 FINAL VERSION July 9, 2010 This survey collects information on your enterprise s

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5

PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 PKI NBP Certification Policy for ESCB Signature Certificates OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document

More information

ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification TS 102 640-4 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Part 4: REM-MD Conformance Profiles 2 TS 102 640-4 V2.1.1 (2010-01)

More information

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance

More information

E-Identification and Authentication practices for ehealth in the EU Member States

E-Identification and Authentication practices for ehealth in the EU Member States E-Identification and Authentication practices for in the EU Member States Ref. Ares(2012)1260755-24/10/2012 e-card with Other e - Identification mean with Austria YES National YES YES Belgium YES National

More information

ETSI TS 102 640-3 V2.1.2 (2011-09)

ETSI TS 102 640-3 V2.1.2 (2011-09) TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

Code of Practice on Electronic Invoicing in the EU

Code of Practice on Electronic Invoicing in the EU CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:

More information