WISeWorld2000 WISeKey By Malcolm Hutchinson CEO & Cofounder WISekey.

Slides:



Advertisements
Similar presentations
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
Advertisements

Global e¦security WISeWorld2000 The WISeKey Global Trusted Infrastructure By Carlos Moreira President & Cofounder WISekey.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
10.1 © 2007 by Prentice Hall 10 Chapter E-Commerce: Digital Markets, Digital Goods.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Copyright © 2004 Pearson Education, Inc. Slide 1-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright ©2001, Ozro Inc. US Patent 6,141,653 Other patents pending 1 Global B2B eCommerce Adoption: The Business Perspective Presentation to The Information.
1 Forum on e-Business Interoperability and Standardization Digital Trade and Transportation Network Friday 14 May 2004.
COMPUTER APPLICATIONS TO BUSINESS ||
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Introduction to E-Business. 2 “It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change” Charles.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Design, Implementation & Roll-out of e-Procurement May 2013 Kang-il Seo | Deputy Director, International Cooperation Division Public Procurement Service.
The Internetworked E-Business Enterprise
Partnership Deal between Eurex and The Clearing Corporation completed Dennis A. Dutterer President and CEO November 5, 2003.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
E-commerce Workshop “Policy and Implementation Ecommerce in Indonesia subtopic “Role of Ecommerce in marketing and trade promotion Jakarta, 3-4 May 2000.
Electronic Commerce Semester 1 Term 1 Lecture 1. Defining Electronic Commerce Depending on whom you ask, electronic commerce (often referred to as e-
PKI Issues: The Payment Perspective March 6, 2000 Ann Terwilliger eCommerce Authentication Visa International.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
MIS 565 – What is Ecommerce Instructor: Ali Hashmi.
COMP 6125 An Introduction to Electronic Commerce Session 4: E-Commerce In Developing Countries.
1 How to overcome Isolated PKI Approaches PKI Forum Munich June 2001 Hubertus SOQUAT German Federal Ministry of Economics and Technology.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Johnson & Johnson’s Public Key Infrastructure Bob Stahl
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
What is e-business?. 2 Agenda Regional Training Workshop for Enterprise Support Agencies to Promote E-business for SMEs in the Greater Mekong Subregion.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Electronic Commerce Jeff Campbell, Piyanuch Chuasiripattana, Travis Flood, Matthew Janocko, Kent Woodburn Research on Electronic Commerce.
11 Project Planning Section 11.1 Identify the stages of the Web site development life cycle Identify the responsibilities of project team members Use a.
Business-to-Business Authors: Authors: Mladenka Jakovljevic, Prof. Dr. Veljko Milutinovic,
Chapter 6 E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS.
VerticalNet Hussain Amin Ismail Lai Carey Hwang Parmar Sanjeev Singh Samudrala Avinash Gopal Tse Wai Hung, Michael.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
1 Developing Credit Insurance in Africa and the Mediterranean, Tunis, October, 2000 Developing Credit Insurance in Africa and the Mediterranean basin.
Electronic Commerce Semester 1 Term 1 Lecture 3. Types of E-Commerce There are three distinct general classes of e-commerce: –Inter-organisational (business-to-business/B2B)
Digital Signatures and Digital Certificates Monil Adhikari.
PKI Policy Determination Process Input from PKI Decision Process PKI Policy Determination Process Application(s) Workflows Players.
Copyright © 2007 Pearson Education, Inc. Slide 1-1 Evolution of E-commerce.
E-commerce: Digital Markets, Digital Goods
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
Slide 1 EC-DC © ITU Telecommunication Development Bureau (BDT). All Rights Reserved. AFRINET2000 The Africa Internet Summit & Exhibition Abuja,
NEW TECHNOLOGIES FOR CITIZENS AND TAX SYSTEM ELECTRONIC TAX RETURN FILING SYSTEM July, 2000 GRUPPO TELECOM ITALIA - FINSIEL.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
B2B, B2C, B2E and E-Commerce Intranet
Date: March. 30, Monday Evening.
Chapter 2: Introduction to Electronic Commerce
E-Commerce: Digital Markets, Digital Goods
Public Key Infrastructure (PKI)
E-Commerce Lecture 6.
E-Commerce for Developing Countries (EC-DC)
Presentation transcript:

WISeWorld2000 WISeKey By Malcolm Hutchinson CEO & Cofounder WISekey

The WISekey PKI Revolution The market for PKI technology is expected to be one of the fastest growing new economy related technologies. Leading institutions estimate the worldwide PKI market to grow from USD 1,1 bn in 2000 to 3,5 bn in 2003.

PKI Avantages Use of PKI enables : Secure authentication of the sender, encryption and integrity of the content and proof of delivery B2B e-commerce & B2C e-commerce: identification of customers, suppliers and B2B exchange participants, as well as legal recognition of on-line contracts Access Control: Providing information and services to only authorized users. On-line banking: secure log-in and signature of banking and trading transactions.

PKI is the Superior Technology

WISekey Partners Building a Global Solution Baltimore Technologies Datamatics Oracle Rainbow Technologies Celo Communications ITU-ECDC Mount10 DataKey Avataro Hewlett Packard Octree Technologies Intel MCI Worldcom Valicert Entegrity Solutions Gemplus KyberPass Vordel EcommercePKI

WISeKey Trust Model Use existing Trust Parties through digitizing their current processes – Analog to Digital Trust. WISeKey acts as the interface between the islands of trust providing global recognition and inter- operability. Technically achieved through the sharing of a root certificate by high authenticate Certification Authorities. Neutral ownership of the root certificate by a Swiss Foundation, operated by WISeKey and administered by a neutral forum.

WISeKey PKI Market Potential There are now more than one billion documents on the web. 6,409,521 servers distribute these documents to more than 200 million users. Of these users, approximately two thirds use the Internet for conducting business, predominately being for . The growth rate is more than doubling each year. Source Inktomi and NEC Research Institute

WISeKey PKI Market Potential Worldwide e-business-to-business revenue is projected to outstrip worldwide business to consumer revenue on the web by a factor of more than four by Source: Dataquest Total business sales via the Internet will rise from US$43 billion in 1998 to US$1.3 trillion by Source: Forrester Research

WISeKey PKI Market Potential Based upon current trends, there should be more than one billion users of the Internet by If two thirds of those remain business users, then there are more than 600 million potential clients with a need for a PKI Certificate. That is 600 million potential WISeKey PKI clients. Even if only 10% of these eventuate as WISeKey PKI users, the WISeKey client base is conservatively 60 million users by By 2005 we expect at least 100 million users.

WISeKey’s Role WISeKey -Is an ASP to Certification Authorites. -Provides trust recognition and interoperability to Certification Authorities -Enables independance of Certification Authorities under agreed policies to meet their own specific industry or jurisdiction requirements

WISeKey’s DISTRIBUTION STRATEGY Sign existing CA’s to use WISeKey’s global root for their certficates Sell turn-key CA solutions to organisations in cooperation with Stratgic Partners –Baltimore Technologies –Hewlett Packard etc. –Offer smaller organizations ability to provide certificate services and growth path through becoming a Registration Authority for an incubator CA

WISeKey PKI Global Growth Path WISeKey ITU – EC-DC Project Gold CAs. E-CommercePKI «Incubator CA » Silver RAs. Bronze RAs. E-CommercePKI Quo Vadis BlueX WISe-IoM WISe- Atlantica Etc. Growth Path

WISeKey-ITU TrustFund Established November 2000 Investment in kind to date by WISeKey of 4 million US$ Investment in kind to date by Expert Group members of 2.5 million US $ Receives US1 per certificate issued within the WISekey PKI Receives external contributions from donnors Will receive transaction revenues via a WISeKey financial clearing house Invests and donates the resources to LDC’s to establish Electronic Commerce projects

WISeWORLD2000 The Secure Electronic Commerce Partnership Conference GENEVA, Switzerland, November 27, 28, 29 ITU Building