Qualified mobile electronic signatures: Possible, but worth a try?

Size: px
Start display at page:

Download "Qualified mobile electronic signatures: Possible, but worth a try?"

Transcription

1 Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security) 4 - for IT security specialists Abstract Four years have passed since the EU directive on electronic signatures has been enacted by the European Union. By 2002, all EU member countries had to implement local legislation for electronic signatures. Development of products and applications in these countries so far, mainly focuses on signing with desktop PC s on the basis of smart cards, issued by certification authorities. Several parties worked on mobile signing infrastructures, but as of today, no integrated implementation of qualified mobile signatures has occurred on the market. This raises the question whether qualified mobile signatures can be implemented at all and whether they can be implemented economically. This paper will analyse and conclude the possible conformance of mobile technology with the EU directive on mobile signatures and discuss economic implications for market scenarios. 1. The EU directive on Electronic Signatures In the directive 1999/93/EC of the European Parliament [EU_esig1999], legal requirements for a common introduction of electronic signatures in Europe were enacted. Within the following 18 months, the EU countries had to adopt the directive to create a harmonized legal system. The directive sets a framework of requirements for security of technology used for electronic signatures. Based on certificates issued by certification authorities, which certify public keys for a person registered by a registration authority, electronic signatures can be created with a so-called secure signature creation device (SSCD), carrying the private keys of a person. In Germany and Austria, the local implementation of the EU directive requires evaluation of the SSCD to be done against ITSEC E4 or CC EAL 4+ levels [FuFr2000]. For directory services, stringent 24/7 availability and durability is required. Revocation lists and other feasible technology must be available to all accepting parties of signed documents. The EU suggests the implementation of a public evaluation infrastructure under control of a government authority. Germany has already implemented a system of evaluation service companies, evaluation consulting companies and the Regulatory Authority for Telecommunications [RegTP] as the responsible government authority. The deployment of products so far focused on smartcards with evaluation against the requirements for lawful electronic signatures. Based on these, personal computer based signature applications have entered the market. These applications require smart card readers attached to the workstation, thereby preventing user mobility. Mobility of lawful electronic signatures is possible within the legal framework of the German signature legislation, as shown in [RFR2003]. This article will analyze the situation with the European perspective. 1 Chair of Mobile Commerce and Multilateral Security, Goethe-University, Frankfurt am Main, Germany 2 Member of "Enabling Technologies for Electronic Commerce" at the Darmstadt University of Technology and collaborator to constitutional design of technology (provet) at the University of Kassel.

2 2. Approaches for mobile signing infrastructures Two possible signing approaches in the mobile environment will be analyzed concerning their potential for conformance with the EU directive on electronic signatures: signatures created in centralized signing server environments located at service providers like mobile network carriers; and electronic signatures created inside the signer s mobile device using a secure signature creation device. Furthermore, solutions using single or multiple smartcards are reviewed, where the conclusion is drawn that SIM-like security modules equipped with signature keys can be part of a law-conforming signing infrastructure. Server based electronic signatures Server based electronic signatures are signatures, that are created by a service provider for a specific user. With server based signatures it is essential to distinguish between signatures that have a corresponding certificate issued under the name of the customer and signatures with certificates issued under the name of the service provider or an employee of this provider. In the first case it is necessary that the customer transfers his private key to the service provider. However according to Art.2, 2(c) the signature has to be created by means that the signatory can maintain under his sole control to achieve the status of an advanced signature. By giving away his private key this premises can not be fulfilled. In the case of signatures whose certificates are issued under the name of the service provider you can not assume these to be legal signatures of the customer. They are signatures of the signature service provider and only enable an identification of the provider. Those signatures can achieve the status of advanced signatures with qualified certificates as long as they fulfill the requirements of Annex I and are provided by certification service provider who fulfills the requirements of Annex II. Therefore the signature service provider acts as an replacement for the customer. However based on the signature of the provider it can not be verified that the customer really authorized the signature. Neither the integrity nor the fact that he authorized it himself can be proven. There are possible technical solutions to accomplish the integrity and accountability of his authorization, but they would require a security environment on mobile devices that would enable the device to create qualified signatures by itself. Mobile device based electronic signatures Signatures can be created inside the mobile device using a secure signature creation device, which has to fulfill the requirements of Annex III. Using a multiple smart card solution, the signature smart card, certified by a certification provider, is inserted into the mobile device, which already contains the usual SIM-Card. Therefore the signature process takes place on the mobile device and the user is able to use basically any signature card available on the market. To ensure that the requirement of Art.2 2(c) can be met, it is necessary to have some sort of reliable access control to the signature functions. The usual pin used to control the access to the telephone functions is not sufficient, since users can keep their phones and SIMs unlocked for convenience. It would also be possible to use a single smart card that contains the SIM-telephone functions, as well as the secure signature creation device. This can be achieved either by leaving some free space on the SIM-card, on which the components of the signature creation device can be installed later on, or by shipping SIM-cards with preinstalled signature functionality that has to be initialized. In the first case problems will arise regarding who gets to certify the public key of the user. The mobile service provider, as issuer of the SIM-Card also wants to certify the signing functionality of the issued smartcard. The customer might want to use a different signature service provider. Within the scope of this article we are going to investigate the spectrum of possible shipment models for mobile signatures. 3. Mobility and Electronic Signing Using Signatures in mobile environments one has to take a look on what is specific about these situations. Mobile Signatures are made with mobile devices and therefore constraints have to be addressed that are not present in traditional signing infrastructures.

3 Data Transfer First of all any traffic that is necessary will be accounted to the bill of the customer. Therefore it is essential to create as little data traffic as possible. In the case of the signature creation traffic is only necessary for the download of the document to be signed, if at all. In the process of signature verification several documents, especially the key of all CA s involved have to be downloaded in order to ensure the integrity of the verification process. Visualization Mobile devices usually are only able to display few amounts of the content of the document to be signed or verified. This gives potential attackers a huge advantage to compromise the integrity of the document before the signing process takes place. Within the scope of this section we will explore possible points of attack and provide means to counter such attacks. Verification Implications on document verification on mobile devices, in particular concerning revocation status and directory accessibility will be reviewed under consideration of various models of certificate validation. With mobile infrastructures for signature verification revocation lists are a particular concern that has to be met. In order to be up to date with actual revocation lists the customer has to be online to be able to get access to the actual status of all the involved signatures and certificates. Standards like ISIS-MailTrusT [ISISMTT] can be useful as well as concepts of server centric support in document verification [Fritsch2002]. This section will analyze verification constraints on mobile signatures. Storage Mobile devices usually have a rather fixed amount of storage space. This trend grows stronger if you have to store the data on the SIM-card itself, for whatever reason possible. Therefore mobile signature application should when ever possible try to store the necessary information on a server of the service provider. This of course is in contrast to the goal of minimizing the necessary traffic for signature applications. Therefore a trade off between cached information and information to be transferred has to be found. This is particularly important for the storage of root certificates, certification chains and certificate revocation lists for offlineverification. We will explore this within this section. 4. Business Applications and Competition Here, we will suggest an infrastructure for certification of keys on mobile telephone cards. Certification will be done in a way that will enable users to obtain their certificates from an arbitrary certification service provider, in particular a different one than the issuer of his telephony credentials. As mobile infrastructures tend to be costly, possible beneficial applications of mobile signing infrastructures will finish the article. SIM, Certification and Competition Combining GSM security and signing on a single smartcard raises some economic and legal questions. Currently, SIM cards are being deployed to the customer in retail stores. They are already initialized with keys and PIN codes, waiting to be personalized or be sold as prepaid without identity registration in many countries. We propose the usage of evaluated smartcards suitable for qualified electronic signatures which are extended by the SIM functionality and usable through a unified interface, e.g. with the USIM specification TS [3GPPSpec]. Another approach might be the migration and evaluation of USIM with a full WAP/WIM implementation for the purpose of lawful mobile signing [WAPForum]. Evaluation must be carried out with ITSEC or Common Criteria within an evaluation process similar to the evaluation summarized in [FuFr2000]. The resulting card would carry (at least) authentication and key data from a mobile carrier when handed out to the customer. Furthermore, the lawful signature component of the card is ready to be initialized and have its public key certified on demand. Through the separation of

4 the telephony function and the (possibly latter) certification of a user s identity by a certification service provider, both functions can be sold separately, and can be obtained from different providers. 2 1 RCA MO SIM/SSCD CSP Mobile Equipment Figure 1: Roles and basic steps in dual use of SIM in GSM and as SSCD. 0. RCA certifies CSP 1. RCA installs root certificate into newly produced, uninitialized SIM/SSCD 2. MO installs IMSI/K i and subscriber information 3. SIM/SSCD ships to subscriber 4. SSCD is initialized by user and certified by CSP after registration MO: Mobile Operator RCA: Root Certification Authority SIM: Subscsriber Identity Module CSP: Certification Service Provider SSCD: Secure Signature Creation Device In our final paper, we will demonstrate an algorithm that ensures the post-certification of keys that are either pre-stored or generated on the signature partition of the smart card while keeping the telephony and certification service provider strictly separated beyond standardization of a smartcard interface and the installation of a certificate. Applications for Mobile Signature This section will explain useful and economic applications of mobile electronic qualified signatures. For obvious reasons, a limited set of transactions is suitable for signing on small devices. For economic reasons, the rather complex infrastructure required for mobile signing further limits the application field. Applications that will be examined include: provable electronic consent in processing of personal data documented consent in participation in location based services

5 legally binding mobile financial transactions, e.g. in intra-banking electronic brokerage documented multiparty authorization of commercial transactions, e.g. payment releases other transactions in trade and logistics. Device federations, e.g. on signature-enabled mobile equipment using an evaluated tablet pc as a display, will enable further applications of mobile signatures: providing larger displays, combinations like this will enable mobile signatures to be used as universal signatures on large documents. This section will conclude with a brief analysis of benefits of signing with federated devices. 5. Summary Our analysis shows that mobile electronic qualified signatures can be implemented with achievable modifications to the current production and distribution of SIM cards, mobile equipment and protocols. Furthermore, we show sample applications for the employment of mobile signature. Therefore, we conclude that mobile electronic signatures according to European legislation are a valuable development for the information society and should be undertaken to enable certain applications of electronic signatures. 6. References [3GPPSpec] Specification of GSM, [ETSI_msig2002] TR MCOMM#3 Draft; available at [EU_esig1999] European Union: DIRECTIVE 1999/93/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 13 December 1999 on a Community framework for electronic signatures [Fritsch2002] Lothar Fritsch: A secure, economic infrastructure for signing of web based documents and financial affairs; CBL Cyberbanking & Law, issue 2/2002; [FuFr2000]Thomas Fuchß, Lothar Fritsch: Security Certificates as a tool for reliably software engineering; Datenschutz und Datensicherheit 9/2000, pp.514ff.; [ISISMTT1.0.2] Common ISIS-MailTrusT specifications for interoperable PKI applications; -mtt-corespec-v1.0.2.pdf; [RegTP] Regulierungsbehörde für Telekommunikation und Post (RegTP) der Bundesrepublik Deutschland; [RFR2003] Johannes Ranke, Lothar Fritsch, Heiko Rossnagel: M-Signaturen aus rechtlicher Sicht; in Datenschutz und Datensicherheit 27 (2003) 2, pp.95ff, Vieweg & Sohn, Wiesbaden [WAPForum] WAP Forum: Spezifikationen von WAP, WIM;

6 Speakers biographies Lothar Fritsch was involved in the ACTS SEMPER project where he designed and implemented an anonymous communication service for the SEMPER e-commerce. He is an expert on electronic signatures with industry experience at fun communications GmbH, having designed applications for electronic signatures before joining the m-commerce research group, where he focuses on privacy and security aspects of location based services in mobile networks, e.g. GSM.. Johannes Ranke is member of the PhD program "Enabling Technologies for Electronic Commerce" at the Darmstadt University of Technology and collaborator to the project group on constitutional design of technology (provet) at the University of Kassel. Heiko Rossnagel is a security expert for signature applications. His focus is SIM based security for mobile applications, where he examines authentication and electronic signatures using SIM security modules and their contribution to overall secure infrastructures with mobile devices. Contact point: Lothar Fritsch Goethe-University Frankfurt Chair of Mobile Commerce and Multilateral Security Gräfstraße 78 D Frankfurt am Main Tel Fax [email protected]

Mobile Qualified Electronic Signatures and Certification on Demand

Mobile Qualified Electronic Signatures and Certification on Demand Mobile Qualified Electronic Signatures and Certification on Demand Heiko Rossnagel 1 1 Chair of Mobile Commerce and Multilateral Security, Johann Wolfgang Goethe University Frankfurt, Gräfstr. 78, 60054

More information

Profitability of Mobile Qualified Electronic Signatures

Profitability of Mobile Qualified Electronic Signatures Profitability of Mobile Qualified Electronic Signatures Heiko Rossnagel Chair of Mobile Commerce and Multilateral Security University Frankfurt [email protected] Denis Royer Chair of Mobile

More information

Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems

Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems October 12, 2004 It is a frequently asked question if

More information

OB10 - Digital Signing and Verification

OB10 - Digital Signing and Verification Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply

More information

Information & Communication Security (SS 15)

Information & Communication Security (SS 15) Information & Communication Security (SS 15) Electronic Signatures Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Agenda

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification

ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security

More information

How To Understand And Understand The Certificate Authority (Ca)

How To Understand And Understand The Certificate Authority (Ca) TS 102 042 V1.1.1 (2002-04) Technical Specification Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V1.1.1 (2002-04) Reference DTS/SEC-004006 Keywords e-commerce,

More information

HOW SECURE ARE CURRENT MOBILE OPERATING SYSTEMS?

HOW SECURE ARE CURRENT MOBILE OPERATING SYSTEMS? HOW SECURE ARE CURRENT MOBILE OPERATING SYSTEMS? Tobias Murmann, Heiko Rossnagel Chair of Mobile Commerce and Multilateral Security Johann Wolfgang Goethe-University Frankfurt D-60054 Frankfurt / Main,

More information

COURTESY TRANSLATION

COURTESY TRANSLATION PREMIER MINISTRE Secrétariat général de la défense nationale Paris, 7 April 2003 872 /SGDN/DCSSI/SDR Reference : SIG/P/01.1 Direction centrale de la sécurité des systèmes d information PROCEDURE CERTIFICATION

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

ETSI TS 101 456 V1.4.3 (2007-05)

ETSI TS 101 456 V1.4.3 (2007-05) TS 101 456 V1.4.3 (2007-05) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates 2 TS 101 456 V1.4.3

More information

Guidelines for the use of electronic signature

Guidelines for the use of electronic signature Republic of Albania National Authority for Electronic Certification Guidelines for the use of electronic signature Guide Nr. 001 September 2011 Version 1.3 Guidelines for the use of electronic signature

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

Future directions of the AusCERT Certificate Service

Future directions of the AusCERT Certificate Service Future directions of the AusCERT Certificate Service QV Advanced Plus certificates Purpose Digital signatures non-repudiation, authenticity and integrity Encryption - confidentiality Client authentication

More information

Concept of Electronic Approvals

Concept of Electronic Approvals E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

MOBILE FINANCIAL INFORMATION SERVICES, SECURITY, AND CERTIFICATION

MOBILE FINANCIAL INFORMATION SERVICES, SECURITY, AND CERTIFICATION MOBILE FINANCIAL INFORMATION SERVICES, SECURITY, AND CERTIFICATION Jan Muntermann, Heiko Roßnagel, Kai Rannenberg Chair of Mobile Commerce and Multilateral Security Johann Wolfgang Goethe-University Frankfurt

More information

Secure Signature Creation Devices (SSCDs)

Secure Signature Creation Devices (SSCDs) Secure Signature Creation Devices (SSCDs) from different approaches Dr. István Zsolt BERTA [email protected] Microsec Ltd. Requirements for SSCDs Annex III of the e-signature Directive, in plain

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

EMA esignature capabilities: frequently asked questions relating to practical and technical aspects of the implementation

EMA esignature capabilities: frequently asked questions relating to practical and technical aspects of the implementation August 2013 EMA/264709/2013 EMA esignature capabilities: frequently asked questions relating to practical and technical aspects of the implementation This question and answer document aims to address the

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification

ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

ETSI TS 102 640-3 V2.1.2 (2011-09)

ETSI TS 102 640-3 V2.1.2 (2011-09) TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

Egypt s E-Signature & PKInfrastructure

Egypt s E-Signature & PKInfrastructure EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:

More information

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION This can be a complex subject and the following text offers a brief introduction to Electronic Signatures, followed by more background on the Register of

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

The Preferred Payment Architecture Technical Documentation

The Preferred Payment Architecture Technical Documentation Mobey Forum / LK 3.7.2001 1/45 The Technical Documentation Requirements for manufacturers and standardisation bodies Version 1.0 Approved by the Mobey BoD on 25.06.2001 Editor: Liisa Kanniainen Workgroup

More information

TC TrustCenter GmbH Certification Practice Statement and Certificate Policy for Qualified Certificates

TC TrustCenter GmbH Certification Practice Statement and Certificate Policy for Qualified Certificates GmbH Certification Practice Statement and Certificate Policy Version 1.0 of June 11 th, 2007 NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Interoperable Mobile Payment A Requirements-Based Architecture

Interoperable Mobile Payment A Requirements-Based Architecture Interoperable Mobile Payment A Requirements-Based Architecture Dr. Manfred Männle Encorus Technologies GmbH; product management Payment Platform Summary: Existing payment methods like cash and debit/credit

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS

CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS Please fill in the form using BLOCK CAPITALS. All fields are mandatory. 1 1. SUBSCRIBER

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]

More information

UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme

UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme CIS 3 EDITION 2 February 2014 UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme CONTENTS SECTION PAGE 1 Introduction 2 2 Requirements for Certification

More information

Business Issues in the implementation of Digital signatures

Business Issues in the implementation of Digital signatures Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous

More information

Electronic Signatures in Norway Supervision and Legal Aspects

Electronic Signatures in Norway Supervision and Legal Aspects Electronic Signatures in Norway Supervision and Legal Aspects By Kristina Rognmo Adviser Section for ecommunication and Internet Networks Department Norwegian Post and Telecommunications Authority 1 Agenda

More information

Statoil Policy Disclosure Statement

Statoil Policy Disclosure Statement Title: Statoil Policy Disclosure Statement Document no. : Contract no.: Project: Classification: Distribution: Open Anyone Expiry date: Status 2019-06-11 Final Distribution date: : Copy no.: Author(s)/Source(s):

More information

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), the Minister of Telecommunications and Information Society hereby promulgates REGULATION

More information

Certificate Path Validation

Certificate Path Validation Version 1.4 NATIONAL SECURITY AUTHORITY Version 1.4 Certificate Path Validation 19 th November 2006 No.: 1891/2006/IBEP-011 NSA Page 1/27 NATIONAL SECURITY AUTHORITY Department of Information Security

More information

Certificate Management in Ad Hoc Networks

Certificate Management in Ad Hoc Networks Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates

More information

ETSI SR 003 091 V1.1.2 (2013-03)

ETSI SR 003 091 V1.1.2 (2013-03) SR 003 091 V1.1.2 (2013-03) Special Report Electronic Signatures and Infrastructures (ESI); Recommendations on Governance and Audit Regime for CAB Forum Extended Validation and Baseline Certificates 2

More information

Merchants and Trade - Act No 28/2001 on electronic signatures

Merchants and Trade - Act No 28/2001 on electronic signatures This is an official translation. The original Icelandic text published in the Law Gazette is the authoritative text. Merchants and Trade - Act No 28/2001 on electronic signatures Chapter I Objectives and

More information

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for Technical Description DigitalSign 3.1 State of the art legally valid electronic signature The best, most secure and complete software for Adding digital signatures to any document, in conformance with

More information

QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark. Email: [email protected] WWW: http://www.qualityssl.com/

QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark. Email: support@qualityssl.com WWW: http://www.qualityssl.com/ QualitySSL by BitEngines Nellikevaenget 12 2625 Vallensbaek Denmark Email: [email protected] WWW: http://www.qualityssl.com/ 2002 BitEngines. All Rights Reserved. Introduction Today, online commerce

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

GlobalSign Digital IDs for Adobe AIR Code Signing

GlobalSign Digital IDs for Adobe AIR Code Signing GlobalSign Digital IDs for Adobe AIR Code Signing Expanding market reach by distributing trustworthy software over the Internet WHITE PAPER Lila Kee Director of Business Development, GlobalSign Inc TABLE

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012 Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12

More information

PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5

PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 PKI NBP Certification Policy for ESCB Signature Certificates OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document

More information

fulfils all requirements defined in the technical specification The appendix to the certificate is part of the certificate and consists of 6 pages.

fulfils all requirements defined in the technical specification The appendix to the certificate is part of the certificate and consists of 6 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company D-TRUST GmbH Kommandantenstraße 15 10969 Berlin, Germany to confirm that its certification service D

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications

Online Security, Traffic Data and IP Addresses. Review of the Regulatory Framework for Electronic Communications Brussels, October 8 th 2008 Online Security, Traffic Data and IP Addresses Review of the Regulatory Framework for Electronic Communications Francisco Mingorance Senior Director Government Affairs [email protected]

More information

Security features include Authentication and encryption to protect data and prevent eavesdropping.

Security features include Authentication and encryption to protect data and prevent eavesdropping. What is a SIM card? A SIM card, also known as a subscriber identity module, is a subscriber identity module application on a smartcard that stores data for GSM/CDMA Cellular telephone subscribers. Such

More information

Certificate Policy for. SSL Client & S/MIME Certificates

Certificate Policy for. SSL Client & S/MIME Certificates Certificate Policy for SSL Client & S/MIME Certificates OID: 1.3.159.1.11.1 Copyright Actalis S.p.A. All rights reserved. Via dell Aprica 18 20158 Milano Tel +39-02-68825.1 Fax +39-02-68825.223 www.actalis.it

More information

SecureStore I.CA. User manual. Version 2.16 and higher

SecureStore I.CA. User manual. Version 2.16 and higher User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR

More information

Qualified Electronic Signatures Act (SFS 2000:832)

Qualified Electronic Signatures Act (SFS 2000:832) Qualified Electronic Signatures Act (SFS 2000:832) The following is hereby enacted 1 Introductory provision 1 The purpose of this Act is to facilitate the use of electronic signatures, through provisions

More information

Microsoft Windows Server 2003 Integration Guide

Microsoft Windows Server 2003 Integration Guide 15370 Barranca Parkway Irvine, CA 92618 USA Microsoft Windows Server 2003 Integration Guide 2008 HID Global Corporation. All rights reserved. 47A3-905, A.1 C200 and C700 December 1, 2008 Crescendo Integration

More information

fulfils all requirements defined in the technical specification The appendix to the certificate is part of the certificate and consists of 6 pages.

fulfils all requirements defined in the technical specification The appendix to the certificate is part of the certificate and consists of 6 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Fabrica Nacional de Moneda y Timbre. Real Casa de la Moneda C/Jorge Juan, 106 28009 Madrid, Spain to

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013 Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines

More information

Security considerations for IMS access independence

Security considerations for IMS access independence 3GPP TSG SA WG3 Security S3#20 S3-010468 16-19 October, 2001 Sydney, Australia Source: Title: Document for: Agenda Item: Telia / independence Information Security Security considerations for access independence

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic

More information

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1 Zentrum für sichere Informationstechnologie Austria Secure Information Technology Center Austria A-1030 Wien, Seidlgasse 22 / 9 Tel.: (+43 1) 503 19 63 0 Fax: (+43 1) 503 19 63 66 A-8010 Graz, Inffeldgasse

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Guidelines for VoIP Service Providers

Guidelines for VoIP Service Providers Consultation Document Austrian Regulatory Authority for Broadcasting and Telecommunications (RTR-GmbH) Vienna April 2005 Executive Summary This consultation document aims to clarify the position of the

More information

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions

More information

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to

More information

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary

More information

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

COMMISSION OF THE EUROPEAN COMMUNITIES. Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 21.9.2005 COM(2005) 438 final 2005/0182 (COD) Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the retention of data processed

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information