North Coast Surety 1 Welcome to Bid List Connection Slide Show presentation to explain how a bond might get processed in the bidding process. This explanation.

Slides:



Advertisements
Similar presentations
The Chico Process as a Bond Reporting Model The Data Flow – Full Chico Process Recapping the Chico Process The Data Flow – Chico Process as a Bond Report.
Advertisements

Instruction: Use mouses left button. Use mouses left button. If mouse buttons dont work, use arrow keys of keyboard for slide show. If mouse buttons dont.
Instruction: Use mouses left button. Use mouses left button. If mouse buttons dont work, use arrow keys of keyboard for slide show. If mouse buttons dont.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Guide to using the myNATE website
By Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson, Linda Lau, Jerri Williams Chapter 9 Fine-Tuning the Database 1 Copyright.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
How the World Wide Web Works
North Coast Surety 1 Welcome to Bid List Connection Slide Show presentation to explain how data can flow in the bidding process. To view the slide show.
North Coast Surety 1 Welcome to Bid List Connection Slide Show presentation to explain how XML works, in English. The technological complexities are not.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
The BIM Project Execution Planning Procedure
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
E-Invoicing & Legal Aspects RA42 Presentation Michael Uebber, LH SIS – Simplified Interline Settlement.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Computer Concepts 2014 Chapter 7 The Web and .
Point and Click Certificate Management Charlotte, NC Ph: Web:
YourClassPage.com TM Inservice Quickstart Guide Getting YOUR classpage up and running!
NATE Training Provider Portal Guide to using the myNATE website Submitting Class Rosters.
Etiquette at MstreamIT. By Sam 1.  1. Title page.  2. Contents page.  3. Introduction.  4. Ways to access s.  5. Send to multiple contacts.
Websites 101 Technology Committee UPSOM. Web Class – Goals  Make a simple web page (or series of pages)  Upload that page to the internet  Feel comfortable.
HTML, XHTML, and CSS Sixth Edition Chapter 1 Introduction to HTML, XHTML, and CSS.
SB 1279 Department of Insurance Electronic Records.
Online Substantive Process TRUST MANAGERS Self Teach Tutorial April 2008 Version 1.0.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
 The World Wide Web is a collection of electronic documents linked together like a spider web.  These documents are stored on computers called servers.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Energy Efficiency Marketing Portal Training Instructions for adding utility logo and contact.
Changes in the Procurement Dynamic 1. Richard H. Shaban Toronto, ON June 4, 2013.
The Chico Process From: Contractor To: Surety Agent Action/Result: Surety Bond requested.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Support.ebsco.com The EBSCOhost iPhone Application Tutorial.
Web Server.
ELECTRONIC COMMUNICATIONS TEST REVIEW. TRUE/FALSE QUESTIONS IS AN ELECTRONIC COMMUNICATIONS FROM ONE COMPUTER TO ANOTHER. A FOLDER CAN CONTAIN FILES.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Digital Signatures and Digital Certificates Monil Adhikari.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
START Electronic Field Book Goal Installing Field Book Program on the PDA.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Presentation on e-Filing. What is e-Filing The process of electronically filing Income tax Returns/Forms through the internet is known as e-Filing. e-Filing.
CLINIC-LAB COMMUNICATION Configuring 3Shape Communicate™
General Adult Education and
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
The EBSCOhost iPhone Application
Administrator Training
* Firstly download your Avast Antivirus setup file from the following links and then save it to your computer where you want to * After downloading your.
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
Online Tools Guide to Security Products International Website.
FAQ 02 How to upload completed Assessment Tasks to the website
Pooja programmer,cse department
The EBSCOhost iPhone Application
Lori Tortora Foreign Agriculture Service
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

North Coast Surety 1 Welcome to Bid List Connection Slide Show presentation to explain how a bond might get processed in the bidding process. This explanation is in English. The technical version entails the use of wrappers, verification and integration protocols, and a host of other elements that are beyond the author of this presentation. One of the goals of this effort is to explain in layman terms what the various programmers along the communication path need to envision as a collective goal. To view the slide show the press the left mouse button or the arrows keys on your keyboard to proceed through the slides.

North Coast Surety 2 This is Part III is a series, and viewers should be acquainted with parts I & II to understand what XML is, and an overview of the flow of data. Owner Contractor Surety Agent Surety Company Data Processing

North Coast Surety 3 Contractor Project Name.XML from Step One-The Download File Contractor saves the downloaded file in the directory they have selected to hold downloads.

North Coast Surety 4 Start:aecXML Highway 1 Tunnel Caltrans BB End:aecXML Step One-The Download File The downloaded file contains an industry standard XML script that contains the basic project information.

North Coast Surety 5 Start:aecXML Highway 1 Tunnel Caltrans BB End:aecXML Step One-The Download File The downloaded file contains an address that links future viewers to the project specific location on the owners website

North Coast Surety 6 Start:aecXML Highway 1 Tunnel Caltrans BB End:aecXML Step One-The Download File The downloaded file contains an address that provides the project specific internet address that the owner has established to ultimately receive the electronic bid bond.

North Coast Surety 7 Start:aecXML Highway 1 Tunnel Caltrans BB End:aecXML Step Two-The Import of Download File Contractor imports the data into Bid List Connection, or any other application that can process the data.

North Coast Surety 8 Step Three Once contractor has imported the data from the download file they complete the remaining fields in the project information panel

North Coast Surety 9 Step Four- Electronic Bid Request Contractor sends electronic bid request to surety agent, with digital signature. It is the beginning of an electronic bid document.

North Coast Surety 10 Start:aecXML Highway 1 Tunnel Caltrans BB Under the Hill Construction Bob Jones San Francisco Larry Williams DFG456787FDGREE344dfRR XRTV34RDR78FD34DS End:aecXML Step Four- Electronic Bid Request The data now includes both the original information from the owners download file and the data added by the contractor. Contractors Data Owners Data

North Coast Surety 11 Owner Contractor Surety Agent Surety Company Start:aecXML Highway 1 Tunnel Caltrans BB Under the Hill Construction Bob Jones San Francisco Larry Williams DFG456787FDGREE344dfRR XRTV34RDR78FD34DS End:aecXML Step Four- Electronic Bid Request Because the bid bond request is from the contractors computer a digital signature can be added, with certification.

North Coast Surety 12 Start:aecXML Highway 1 Tunnel Caltrans BB Under the Hill Construction Bob Jones San Francisco Larry Williams DFG456787FDGREE344dfRR XRTVT345GR78FD34DS North Coast Surety Insurance Services, Inc. NCS1239 K. Dixon Wright Approved under existing Program U DFG456787FDGREE344dfRR XRTVT345GR78FD34DS End:aecXML Step Five-The Agent Processes Request The surety agent processes the bid request, adds its digital signature, with certification. The resulting XML file contains the project data, with both the contractors and the agents signature. Agents Data Owners and Contractors data

North Coast Surety 13 Step Five-The Agent Processes Request The data is received by the surety company. The agent is authorized to issue the bid bond. The record of the bonds issuance is maintained by the surety. Owner Contractor Surety Agent Surety Company

North Coast Surety 14 Owner Contractor Surety Agent Surety Company From Surety Agent to Caltrans: Start:aecXML Highway 1 Tunnel BB Under the Hill Construction Larry Williams DFG456787FDGREE344dfRR XRTVT345GR78FD34DS DFG456787FDGREE344dfRR XRTVT345GR78FD34DS End:aecXML Step Six-The Agent Transmits Bid Bond Agent transmits just the information necessary for the bid bond, including the contractor and agents signatures. It also identifies the verification address for the surety.

North Coast Surety 15 Step Seven-The Owner Verifies the Bond The file received by the owner contains all the information necessary for the owner to verify directly with the surety company, or a third party verification facility, the authenticity of the bond. Owner Contractor Surety Agent Surety Company

North Coast Surety 16 Start:aecXML > Highway 1 Tunnel > > > > > > BB > >Under the Hill Construction > >DFG456787FDGREE344dfRR > >XRTVT345GR78FD34DS > >DFG456787FDGREE344dfRR > >XRTVT345GR78FD34DS > >345GR7 > >38fr45GR7 > DFG456787FDGREE344dfRR XRTVT345GR78FD34DS End:aecXML Step Eight-The Surety Verification The surety matches the received request for verification against the bonds it maintains records on. A match results in an affirmative verification, with the surety company digital signature.

North Coast Surety 17 Step Eight-The Surety Verification The owner now possesses all the information and authentication necessary to conclude the bond process. Owner Contractor Surety Agent Surety Company End Beginning