Commercial Presentation 1AIAC 2010-2011 Group 1.  Motivation – Qualification Assurance  CERTCOP - Competence verification  Motivation – Document Validity.

Slides:



Advertisements
Similar presentations
Technical Presentation AIAC Group 11. System Rationale System Architecture Secure Channel Establishment Username/Password Cartão Cidadão Digital.
Advertisements

Travel and Expense Management Scenario Overview
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
EGovernment Vision, Policies and Implementations in Austria Prof. Dr. Reinhard Posch CHIEF INFORMATION OFFICER.
Digital Stamps of Companies Tarvi Martens SK, Estonia.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Functional component terminology - thoughts C. Tilton.
Travel and Expense Management Scenario Overview
Dr. Julian Lo Consulting Director ITIL v3 Expert
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
SOLVE THE PROBLEM OF IDENTITY THEFT An online, real-time solution for KYC, POPI, RICA and FICA compliance May
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Anonymity and Security in Public Internet Forums Ho-fung LEUNG Senior Member, IEEE Dept. of Computer Science & Engineering The Chinese University of Hong.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
SACMAT02-1 Security Prototype Defining a Signature Constraint.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Miguel Nunes Information Systems Project Management IS Project Resources.
International Project on ovecoming of Veterans' psychotrauma sequences Information System Company psychologist Ukrain.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
1 Conservation Transaction Plug-In (CTP) Tool Overview March 23 & 25, 2010 Tim Pilkowski State Conservation Agronomist Annapolis, MD USDA is an equal opportunity.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Automating Training to Meet AAVLD Requirements Presented by: Andrew Havens Director of Services ECL2 Quality Solutions October 19, 2013.
PIV 1 Ketan Mehta May 5, 2005.
X-Road – Estonian Interoperability Platform
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
The Internet Identity Layer OpenID Connect Update for HIT Standards Committee’s Privacy and Security Workgroup Wednesday, March 12th from 10:00-2:45 PM.
Characteristics of ERP Systems. There are some significant differences between ERP and non-ERP systems. These differences are:  In ERP systems, information.
 In Karnataka, Digital Signatures are being extensively used in various projects right from delivery of citizen centric services through various projects.
Enterprise Security for Microsoft Dynamics GP Jeff Soelberg
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
DIGITAL SIGNATURE.
The German eID and eIDAS
Security and Privacy: Panel of Perspectives Rick Skeel University of Oklahoma.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
COOKIES AND SESSIONS.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
Frank Schipplick Work Package Coordinator WP1 - eSignatures.
TAG Presentation 18th May 2004 Paul Butler
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
ESign Aashutosh.
Cloud SaaS Integrates with Office 365 to Meet the Needs for Business Contact Management “Pobuca combined with Microsoft Office 365 and Azure Active Directory.
TAG Presentation 18th May 2004 Paul Butler
Estonian e-Governance best practices and cooperation with UN Ingmar Vali Centre of Registers and Information Systems Estonia Who am I, where I am from:
CRM software: useful tool for building business
Digital Signatures and Forms
Student Financials Cashiering.
X-Road as a Platform to Exchange MyData
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Appropriate Access InCommon Identity Assurance Profiles
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Integrated Security System
Security Mechanisms Network Security.
Presentation transcript:

Commercial Presentation 1AIAC Group 1

 Motivation – Qualification Assurance  CERTCOP - Competence verification  Motivation – Document Validity  CERTCOP - Document Validation  Motivation – Digital Signature Duration  VERICOP – Digital Signature Durability 2AIAC Group 1

 Work within a company is usually cooperative, but in big companies, everyone may not know their co-workers personally AIAC Group 13

 What we need is a quick, yet reliable way to prove possesion of roles AIAC Group 14  But it must be simple to use: or nobody will  And also, simple to implement on companies

 The CERTCOP system enables companies to register their employee’s roles, and link them to their Citizen’s Card AIAC Group 15  Minimal integration effort:  A standard MySQL database  A generic Java Enabled server

 And since this type of information may be sensitive, the system provides access only to people with proper autorization AIAC Group 16

7  Having a certain role in a company comes with accountability for some decisions, and you should be able to record them with assurances

 Couldn’t we bind both identity and role of the author to one of these documents, effectively making the document authentic, and forgery proof? AIAC Group 18

 The system provides you with the ability to bind you and your role to your own documents AIAC Group 19  These documents may be validated by interested third parties, who have proper authorization

 Even though people’s roles may be temporary, the validity of a previously binded document shouldn’t AIAC Group 110

 VERICOP is an additional system that is designed to overcome the limitations of Digital Signatures, by keeping track of all of them AIAC Group 111 VERICOP

 Then, even if the system is compromised, the data necessary for document verification is still accessible  VERICOP is even designed in a way that may allow users to automatically revalidate a digital signature in case of expiration AIAC Group 112

 Those roles may be bound to documents, effectively providing it with more assurances  An “optional” VERICOP system may even further increase productivity, by providing uninterrupted document validity  The CERTCOP system caters all the role checking needs for your company, with effortless implementation AIAC Group 113 Founding Partner Chief Operating Office …