TDL Meeting 7-8 April 2014 //Vienna Sprint Proposal The key of a legal on line signature The key of a legal on line signature: The inseparable link between.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The Austrian Governmental eDelivery System Technical Aspects Ankara, March 17th, 2015 Christian Maierhofer, EGIZ The E-Government Innovation Center is.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
S.1 Using a Global Validation Service to Unite Communities Jon Shamah EMEA Head of Sales, BBS eSecurity.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
The Global API Federation
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
Infrastructure for Electronic Government, An Overview
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
UN Economic Commission for Europe 23rd UN/CEFACT FORUM 7-11 April rd UN/CEFACT FORUM – Geneva Tahseen A. Khan Project Proposal : Trusted Third Party.
LOGO MIRJANA SEKULOVSKA, PhD, DEPUTY MINISTER OF INFORMATION SOCIETY Republic of Macedonia Ministry of Information Society.
National Smartcard Project Work Package 8 – Security Issues Report.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
E-Invoicing & Legal Aspects RA42 Presentation Michael Uebber, LH SIS – Simplified Interline Settlement.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Functional Model Workstream 1: Functional Element Development.
LINKED Administrative & Finance overview18/03/2010 LINKED Leveraging Innovation for a Network of Knowledge on Education LIFE LONG LEARNING PROGRAMME LLP.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
SODA Archiving October 2013
Roles and Responsibilities
X-Road – Estonian Interoperability Platform
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
EFoodChain project Bruno Prépin.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
The German eID and eIDAS
INTERCENT-ER Agency A regional prospective on e-invoicing Stockholm - December 2, 2014 Regional Agency for the development of electronic markets.
eIDAS: current state of play and the Luxembourgish approach
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
Strategy and experience of Spain in interoperability for eGovernment.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
© 2015 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. About this Presentation  How to use this deck:  This is the Global Channel.
© 2015 TM Forum | 1 Service Level Management for Smart City Ecosystems and Trusted IoT Nektarios Georgalas, BT.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION Frank LEYMAN Manager International Relations 04/06/2009.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.
Cross-sector and user-centric AAI
Paperless & Cashless Poland Program overview
The ePhyto Solution A Guide to implement the ePhyto System
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Digits-2-Digits.
TRACES Trade Control and Expert System Electronic sanitary certificates using qualified electronic signature Brussels 15th September 2016.
Dashboard eHealth services: actual mockup
e-Invoicing – e-Ordering 20/11/2008
Website authentication E-registered delivery
Reiniger LLC.
Reiniger LLC.
Presentation transcript:

TDL Meeting 7-8 April 2014 //Vienna Sprint Proposal The key of a legal on line signature The key of a legal on line signature: The inseparable link between e-Authentication, e-Signature and e-Validation

Description of innovation Certiway’s Ecosystem  Introduction of assurance levels in real time transactions  Real-time contractualisation of each bilateral relationship and provision of legal claim CERTIWAY  Validation platform, CERTIWAY, to guarantee end-to-end trust: revocation list management, data domiciliation & data consolidation, accountability between all service providers, recovery, resilience (ISO and 27035), interoperability

Description of innovation Certiway’s Ecosystem  Description of a use case of new trust services and e-ID regulation (eIDAS) for cross border digital signature, applicable for handling real time processing of mass transactions. Use Case including: -a strong e-Authentication TDL Microsoft -a qualified electronic signature creation device TrustSeed -a validation of qualified electronic signatures CertiWay - Legal evidence and privacy’s protection CertiWay

The urgent needs of Businesses and Users New control technologies for digital identities – e-authentication – Establishing trust frameworks and increasing the interoperability of trust services – New design principles for easy and cheap deployment of complex architectures, e.g. architecture serving complex identity infrastructures New solutions digital signature, easy, cheap and legal – Easy to use, easy to deploy – Insurance levels for guarantees

The urgent needs of Businesses and Users – Compliant with upcoming European Regulations : REGULATION on electronic identification and trust services for electronic transactions in the internal market (eIDAS Regulation) REGULATION on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) DIRECTIVE concerning measures to ensure a high common level of network and information security across the Union (NIS Directive)

Benefits The innovation linking in real time… : From a basic to a high eID security level Strong authentication Bilateral contracts e-Signature and their validation Validation (authentication, signature and delivery) Control of the document to sign : its integrity and these mandatory data Respect of the privacy Assurance levels … is the only way to be compliant with the three upcoming European Regulations. This innovation makes your business get a head start.

Benefits In the meantime, the innovation allows : “PRIVACY BY DESIGN” - an effective protection of the data of citizens and of businesses “PRIVACY BY DESIGN” - only the electronic exchanges previously agreed “ACCOUNTABILITY” & “TRACEABILITY” - Focus on your core business and entrust liability to the qualified trust service Providers “ENTRUST LIABILTY” - as a consequence: the drastic reduction of fraud and the capability to save money “STRUGGLE AGAINST CYBER CRIME” “STRUGGLE AGAINST CYBER CRIME”

Use Case: 1. Joining TDL Sign legally online the TDL membership agreement TDL Membership Prospective member applies for membership Written application send to the TDL office Board of Directors approves applications Member accepts articles of Association & Rules and Policies Application form contains: – Signature – Contact details and billing information – Adherence to Articles of Association – Adherence to rules & policies Weakness in process! 1.No control if the signature is from an authorised representative 2.No bilateral signature 3.No version management of signed AoA & Rules and Policy connected to the signature

2. By signing online in compliance to the upcoming regulations Stored in the cloud: Applicant Company Z Agreement version.X Rules & Policies version.Y Authorised to access TDL office 365 Agreements Signature of agreement by applicant Signature of agreement by TDL Board of Directors Storage of sealed legal proof documents Electronic agreements Probative value Proof of exchange Attribute for invoicing Attribute for access 365 Proof of acceptance Legal archiving (WORM) E-authentication platform E-signature platform Validation platform Validation platform TDL office 365

General flowchart of the processes

TDL countersigns agreement without membership fee PenSeal Signature and Verification Service Validation Service Provider Contract deposit Signature Proof Creation Contract Signed + Proofs deposit for archiving Proofs Transfer request Contract Signature information for TDL Board Authentication + Signature Request TDL Board TDL Entreprise Application Portal Service Invocation of Electronic Signature Prospective member MS Azure Sharepoint PIN Entry Strong Authentication Activation Strong Authentication – Phase 1 PIN Check Approved Contract Signature Notification for prospective member Contract Sign Strong Authentication – Phase 2 contract is shown to TDL Board Signature validation and hash creation Signature validation approved notification Request for reviewing contract Receipt Proof Creation Validation Request Step 3 Step 4

Use case overview Immediate Perspective In our solution, we use the Microsoft claim system completed by the TDL check of the supporting documents uploading by the Prospective Member. Tomorrow Perspective There will be different attribute providers that will be in charge to attest the authorized signees of companies.

Feedback on the sprint What have been done so far:  Researched the interface between the Microsoft e-Authentication platform  Researched the interface with TDL office 365  Worked out the workflow … and What needs to be done:  Implementation of a use case in TDL community

Costs estimation for the Sprint Total budget for the sprint: € Requested budget: € Method of cost estimation: 3 persons x (nb man days) x (500€) Already executed: approx. 8 man days = 12k euros Conceptual design and technical feasibility check Use case description Research aspects of relying party (TDL contracting) Preliminary workflows Needed to finalize the sprint (refer to slide 18 with details) Analysis (legal functional): 10 man days Design phase : 10 man days Implementation phase : 16 man days Dissemination of results (public paper): 10 man days Costs for availability technical platform: 6.000,- Costs for travel and unforeseen: 4k€

Use Case – Implementation view TDL membership agreement signing

Use Case – Implementation view Signing the TDL membership agreement

TDL Sprint requirements Design phase : – Detailed storyboard and technical details – Review of existing components and apps – Technical specification – Prototyping API’s  Validation for implementation phase Implementation phase : – TDL uses OFFICE SHAREPOINT 2013 on 365: need technical description of document formats, web application – UIA Authentication service: need technical description of service – Access to a TDL test environment: office365 and E-authentication (test bed) – WSDL and service point addresses of existing web services

Contribution to the TDL ATTPS Testbed & TDL innovation lines Trusted stack – Trust framework architecture providing e-commerce middleware to guarantee probative value of any ”interchange” transaction and payment delivery. – Trust service provides an claim to prove validity of audit (level and duration) Data life cycle management – Revolving probative value to extend the life cycle of the digital signature. (also part of regulation) – Legal archiving of signatures & documents in the cloud and proof of exchange (transparency). – Management of transaction recovery (traceability of the transaction) Service integrity – Guarantees the integrity of the documents ATTPS TESTBED – Other relyping parties and attribute providers can keep autohorized signees of companies.