The OTENTIK trust network

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Secure Electronic Transaction (SET)
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Configuring Directory Certificate Services Lesson 13.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
DIGITAL SIGNATURE.
e-Breeder Documents – closing the gap in the identity management chain
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Key Management and Distribution Anand Seetharam CST 312.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
Topic 9 Authentication and authorization. Authentication Authentication is the process of determining whether someone or something is, in fact, who or.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
TAG Presentation 18th May 2004 Paul Butler
Trust Profiling for Adaptive Trust Negotiation
Web Applications Security Cryptography 1
Cross-sector and user-centric AAI
Trust and Identification
Technical Report PKI for
ESign Aashutosh.
Unit 3 Section 6.4: Internet Security
Grid Security.
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Identification of Locations & Products in complex Supply Chains
Authentication.
Chris Wendt, David Hancock (Comcast)
Blockchain Helpline Number
Class 3 Digital Signature Certificate Noida
SOLUTION FOOD (Track and Trace)
SOLUTION LAND TITLES.
Digital Signatures and Forms
Message Digest Cryptographic checksum One-way function Relevance
TRACES Trade Control and Expert System Electronic sanitary certificates using qualified electronic signature Brussels 15th September 2016.
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Blockchain technology at Change Healthcare
SOLUTION DOCUMENTS.
Secure Electronic Transaction (SET) University of Windsor
Technical Report PKI for
Digital Certificates and X.509
Office 365 Identity Management
SOLUTION ID CARDS AND DRIVER’S LICENSES
Lecture 4 - Cryptography
Installation & User Guide
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
Dashboard eHealth services: actual mockup
The Italian Academic Community’s Electronic Voting System
Advanced Computer Networks
September 2002 CSG Meeting Jim Jokl
Electronic Payment Security Technologies
Reiniger LLC.
Una herramienta para la gestión de identidad, el control de acceso y uso compatible con la regulación de identidad europea eIDAS.
Chapter 8 roadmap 8.1 What is network security?
National Trust Platform
Presentation transcript:

The OTENTIK trust network

We all wish to live in a world based on trust.

Every day, billions of documents and objects are created, used and consulted. Our social and economic fabric depends on it, sometimes vitally.

This trust is shaken, daily. New technologies and deceits reduce the barrier to entry for counterfeiting and fraud.

Counterfeiting is widespread in some countries. What confidence do we give to these documents and products?

Imagine a TRUST network connecting those who verify to those who certify.

Imagine a trust network to validate the legitimacy of the documents we consult and the goods or objects around us.

We imagined it. its foundation adheres to the principles of eIDAS and GDPR. It will be fully operational in 2019.

The Otentik trust network connects the user The Otentik trust network connects the user* who verifies the legitimacy of the document (or the object) to the one who certified it. * Whether citizen, public or private actor, the user can act as an inspector in the context of ISO 16678.

Its operation is delegated to certification authorities (CA), acting as trusted third party. It ensures the legitimacy of the issuer, and validates the nature of the information certified.

At the heart of the OTENTIK trust network is the VDS - Visible digital Seal. ORIGIN Key data LeGITIMacy It is a 2D barcode applied to the document or object. It includes key data that is electronically signed to detect tampering, to confirm the authenticity of the document and the legitimacy of the issuer.

The OTENTIK VDS can use standard or proprietary 2D codes (ex The OTENTIK VDS can use standard or proprietary 2D codes (ex.: Datamatrix, QR, or SealCrypt, Alphacode). It can even be stored in an RFID tag. The code used is generally defined by the use case or the amount of information.

Its validation is simple and easy.

The Otentik VDS can be validated offline. Online validation can offer several advanced features, such as access to the original electronic document, or real-time traceability. It can easily integrate to various Blockchain initiatives.

Its true limit: our imagination

This VDS is leveraging the AFNOR standard XP Z42-101 (France), and is on its way to ISO. It is the evolution of the ANTS 2D-DOC VDS technical specification, in operation since 2012.

The OTENTIK network federates the governance required for each type of VDS on its network (Otentik VDS, 2D-Doc VDS, etc) Efforts to standardize internationally this governance will begin shortly. Each VDS specification can thus evolve with great autonomy, and the network ensures the highest standards in terms of identity and legitimacy.

About the VDSIC Founded in 2016 by 20 public and private entities. It ensures the governance of the OTENTIK Trust Network, the standardization of data on the network and the adoption of the VDS.

Questions? Otentik.codes info@otentik.codes