1 Electronic Signature of Engineering Data Florida Department of Transportation Engineering CADD/Systems Office Bruce Dana, PE.

Slides:



Advertisements
Similar presentations
Credit Card Processing
Advertisements

Recurring Journal Entries
Scheduling Discoverer Reports Scheduling Standard Reports Printing & Re-printing Standard Reports Focus on Reports Session 2 To print: Right click Choose.
Excel Tutorial 6 Managing Multiple Worksheets and Workbooks
Microsoft Excel 2003 Illustrated Complete Excel Files and Incorporating Web Information Sharing.
MODULE 4 File and Folder Management. Creating file and folder A computer file is a resource for storing information, which is available to a computer.
The Name Equality Act of 2007 AB 102 (Chapter 567, Statutes of 2007)
WebDFS Budget Amendment and Personnel Processing.
XP New Perspectives on Microsoft Office Word 2003 Tutorial 1 1 Microsoft Office Word 2003 Tutorial 1 – Creating a Document.
XP 1 Microsoft Office Word 2003 Tutorial 1 – Creating a Document.
The Online Activities Module OAM Describing the F-7 & F-7A.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Tests, Procedures, and Codes.
Adding metadata to intranet documents Please note: this is a temporary test document for use in internal testing only.
Management Information Systems MS Access 2003 By: Mr. Imdadullah Lecturer, Department of M.I.S. College of Business Administration, KSU.
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 21: Publishing Your Pages on the Web.
Microsoft Office Word 2013 Expert Microsoft Office Word 2013 Expert Courseware # 3251 Lesson 4: Working with Forms.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Shipping Bill Demo 1.Role of Unit Maker/CHA user 1.Preparation of a Shipping BillPreparation of a Shipping Bill 2.Submission of Shipping Bill to Unit ApproverSubmission.
Welcome to the Electronic Permit Submittal and Processing System (EPSAP) Professional Engineer Submittal Instructions.
Page 1 Returns Receivings By MIS Department. Page 2 The Returns Process When a store or customer wants to return goods, they are supposed to contact the.
A Guide to the BIZNET Online Filing System STATE OF CONNECTICUT DEPARTMENT OF CHILDREN & FAMILIES (DCF) DEPARTMENT OF DEVELOPMENTAL SERVICES (DDS) DEPARTMENT.
NextGen Trustee Department Disbursements This class will cover the various methods of handling department disbursements. Whether entering them manually.
4-H Leader Training 4-H On-Line Orientation. The Basics of 4-H Online 4-H Online is located at: There are help sheets for members,
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1 State Records Center Entering New Inventory  Versatile web address:  Look for any new ‘Special Updates’ each.
Moodle (Course Management Systems). Assignments 1 Assignments are a refreshingly simple method for collecting student work. They are a simple and flexible.
PPS/OPTRS Departmental Roles Structure System Presented by Payroll Services.
WPM What’s behind the icon? Work Programme Management.
Chapter 6 Generating Form Letters, Mailing Labels, and a Directory
New Form Approval Process. Background New Process is effective April 1, 2014 Changes Chapter 4 in the Library Manual (the reissued 2014 manual will be.
© 2003 Everett Public Schools Information Systems and Technology Department Getting Started with FirstClass October 10, 2015.
Activating Clarity  Activating Clarity  Activation  Online Activation  Fax Activation  Review and Verify Activation and License Terms  Updating.
Management Information Systems MS Access MS Access is an application software that facilitates us to create Database Management Systems (DBMS)
VistA Imaging Capture via Scanning. October VistA Imaging Capture via Scanning The information in this documentation includes only new and updated.
Version Advanced User Training. Instructions This training module contains additional key concepts that are an extension to the concepts in the.
Downloading and Installing Autodesk Revit 2016
MS Access 2007 Management Information Systems 1. Overview 2  What is MS Access?  Access Terminology  Access Window  Database Window  Create New Database.
Using Microsoft Visual Studio 2005 Original by Suma Rao Revised by John G. McMahon ( 9/6/2008 )
Microsoft Access 2010 Chapter 10 Administering a Database System.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
WorkManager Concepts & Schema Course Outline The Old “Business Rules” Traditional LBNL CAD Method New “Business Rules” Engineering Data Management WorkManager.
Your Digital Technology Briefcase My information…when and where I need it.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
2004/051 >> Supply Chain Solutions That Deliver Users.
1 Work Orders. 2 Generating a Work Order There are two methods to generating a Work Order in the WYNNE STSTEM. First method: Option 11 – 12 – 13 * Open.
How to Complete FAFSA (Free Application for Federal Student Aid)
Reliance PPAP Application. Reliance - PPAP The PPAP application is designed to generate and track the entire Purchase Part Approval Process. Reliance.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
ACCESSING AND UTILIZING THE PROVIDER PORTAL MEDICAL AUTHORIZATION UNIT 1.
McGraw-Hill/Irwin The Interactive Computing Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Excel 2002 Using Macros Lesson.
SCC P2P – Collaboration Made Easy Contract Management training
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
Compatible with the latest browsers; Chrome, Safari, Firefox, Opera and Internet Explorer 9 and above.
Procurement Desktop Defense (PD²) Creating an Indefinite Delivery Contract SPS Spotlight Series February 2014.
WikID installation/training
Welcome to the Electronic Permit Submittal and Processing System (EPSAP) Professional Engineer Submittal Instructions.
Getting Started Guide.
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
PPS/OPTRS Departmental Roles Structure System
Floral Demo The following demo shows the features of our floral program. The floral program is an additional module of SimPOS! Retail Point of Sale. Descriptive.
AGILENT TECHNOLOGIES RESTRICTED
Unemployment Insurance Agency Michigan Web Account Manager
Using screens and adding two numbers - addda.cbl
7 Creating Claims.
Two methods to observe tutorial
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Presentation transcript:

1 Electronic Signature of Engineering Data Florida Department of Transportation Engineering CADD/Systems Office Bruce Dana, PE

2 What does the Board say? (4) Engineers who wish to sign and seal electronically transmitted plans, specifications, reports, or other documents shall follow the procedures set forth in Rule 61G , F.A.C. Specific Authority FS. Law Implemented FS. History--New , Amended , Formerly 21H-23.02, Amended , Formerly 21H , Amended Amended G Procedures for signing and sealing electronically transmitted plans, specifications, reports or other documents. (1) Information stored in electronic files representing plans, specifications, plats, reports, or other documents which must be sealed under the provisions of Chapter 471, F.S., shall be signed, dated and sealed by the professional engineer in responsible charge. (2) Electronic files may be signed and sealed by creating a "signature" file that contains the engineer’s name and PE number, a brief overall description of the engineering documents, and a list of the electronic files to be sealed. Each file in the list shall be identified by its file name utilizing relative Uniform Resource Locators (URL) syntax described in the Internet Architecture Board’s Request for Comments (RFC) 1738, December 1994, which is hereby adopted and incorporated by reference by the Board and can be obtained from the Internet Website: ftp://ftp.isi.edu/in- notes/rfc1738.txt. Each file shall have an authentication code defined as an SHA-1 message digest described in Federal Information Processing Standard Publication "Secure Hash Standard," 1995 April 17, which is hereby adopted and incorporated by reference by the Board and can be obtained from the Internet Website: A report shall be created that contains the engineer’s name and PE number, a brief overall description of the engineering documents in question and the authentication code of the signature file. This report shall be printed and manually signed, dated, and sealed by the professional engineer in responsible charge. The signature file is defined as sealed if its authentication code matches the authentication code on the printed, manually signed, dated and sealed report. Each electronic file listed in a sealed signature file is defined as sealed if the listed authentication code matches the file’s computed authentication code. Florida may have been the first State to implement an electronic signature alternative??

3 To make a long story short… If the traditional ink signature and impression seal is good enough for paper documents... It’s good enough for electronic documents too! All we need is a way to do it, and that is where PEDDS comes in…

4 How PEDDS Works 1. PEDDS relies on a one-way cryptographic hash function (SHA-1) to uniquely identify electronic data, (a fingerprint) 2. Hash codes created by SHA-1 are protected by the traditional means of manual signing and sealing. (That’s all there is to it!)

5 PEDDS One-Way Cryptographic Hash Functions: The hash code is solely dependent on: 1) The file’s content and, 2) The cryptographic hash function (in PEDDS case it’s the fed’s SHA-1) One-way means it’s easy to generate in one direction -- go from an input file and generate the hash code, but very hard to go backwards  find two non-identical, files with the same hash. Path / filenames do not effect the hash result, so files could be named anything* To PEDDS, files are zero’s and one’s, so file type doesn't matter.

6 Producer - Electronic File SHA-1 Hash Code Signed and Sealed Printed Document with Hash Code Customer - Electronic File SHA-1 Hash Code Verify Document Hash Code matches newly computed Hash Code Securing Authenticating

7 Advantages of Electronic Signature Model Security and identity is no different than in the paper world…still relies on ink signature / seal No third-party key management authority needed  No fees for transactions, transaction between originator and customer exclusively, internet not required  Longevity (No one will guarantee keys for perpetuity) Single sheet of paper could secure 1  epsilon files  You still have to store that one sheet of paper somehow Boards did not have to change rules significantly FDOT provided the software, others could too Disadvantage – not a 100% digital signature Contrast: Electronic Signature & Digital Signature (one still uses ink and seals)

8 SHA-1 HASH CODE 1 HASH CODE 3 HASH CODE 2 HASH CODE 4 File 2 File 1 File 3 File 4 MANIFEST File URL / HASH 1 URL / HASH 2 … A Manifest is a listing…A Signature file is also a Manifest For multiple files, each is passed through SHA-1 and the results with the URL of the operated file are compiled into a manifest (Manifest file for the entire project, Signature file for those selected to signed/sealed by a Signatory)

9 MANIFEST or SIGNATURE FILE URL / HASH 1 URL / HASH 2 … SHA-1 MANIFEST DOCUMENT HASH CODE of MANIFEST FILE SIGN HERE SIGNATURE DOCUMENT HASH CODE of SIGNATURE FILE SIGN / SEAL The Manifest (or Signatory file) itself then passes through SHA-1, resulting in a single hash that can secured all the data referenced in either the Manifest file or Signatory file. The hash result is printed on a paper to be signed / sealed. To Authenticate the data, at any future time, the process is repeated and all that must be done is a comparison of a single hash code.

10 Creating a PEDDS Project (If it has not been done before) PEDDS recognizes a project by looking for a \_meta_info\ directory beneath the project directory. If the files ProjectID.XML if found in the \_meta_info\ directory, the PEDDS will see the project. If not, then you must run Project > New from the menu pull-down to create the project for PEDDS. HINT: Use the Help in PEDDS ! Explains how to do most things (almost). Don’t Forget Help!

11 Creating the Project and project Identification Information The briefcase icons above indicate existing PEDDS projects As shown, were about to “create” the PEDDS project for “ ” Next, we need to create Project identification information (the ProjectID.XML file).

12 Project Identification and Location It is very important that this information be entered as accurately as possible. On the Location screen, some field are multi-entry, combination fields (Segment and State Road Number). To use these, Fill the data entries in the field(s), then press the Add button. You can afterward enter another set of values and then press Add. Don’t Forget Help! Different entities could produce their own “ProjectID” to for their application**

13 More Project Identification data The State Road number is also a multi-entry, combination field. On the Disciplines dialog, check the options that are anticipated to be part of the data on this project. Note: the data in ProjectID can be updated later as the project progresses.

14 More Project Identification data The entire Bridge Identification dialog is a multi-entry, combination fields. The Key Words are used for the future when people are searching for this project using ad-hock searches. The General Description and Comments can be used as search keys too. Be verbose and describe carefully.

15 More Project Identification Data Enter the FDOT project manager and anticipated professional’s of record and their area of responsibility. Again, note the multi-entry, combination fields. Remember, the Project ID data can but updated at and time before the project is secured in the end. The project ID data is finished and the right dialog appears. Pressing “next”…

16 Additional description information Note the Project manager dialog above. This is used to enter the identy of the person managing the data for the delivery (not the Project Manager). The Description is explained on the dialog…

17 The Main PEDDS Dialog – Let’s create a Signatory (one who Signs, or Signs and Seals)

18 Enter the Name, Signatory Number and check the Signatory Type Signatory files can be secured with a Pass-phrase, although in most cases it is not necessary to do so. Security is still vested with the ink Signature and Seal ! You can create multiple Signatories for a single individual… Create “lay” signatories (Signature – No Seal) to sign only. Use FL Drivers license (which is your Official State ID by Statute) as the Signatory Number

19 Select files to Sign / Sign and Seal Choose files with Ctrl-click, or Shift-click just like in Windows. Once highlighted, right-click to access function menu above. Select the group with the option show. Files may be selected across project directories too.

20 Files selected, ready to Sign / Seal

21 Sign / Seal selected files…

22 The Signature Document The Signature Document should printed, Signed / Sealed by the Signatory. This document secures the files selected, and bears the SHA-1 Hash code of the Signatory file (which stores the listing of the files secured and their SHA-1 Hashes. Note: Data cannot be later authenticated without a copy of the Signature Document. The security is still the ink signature and seal !

23 The aftermath of Signing / Sealing

24 Create or Select additional Signatories The active Signatory is selected from the pull-down list shown above

25 Secure the Project when you are finished Securing the project runs all files in the project through SHA-1. This process creates the Manifest file - (Manifest.XML) Note: Securing the project is normally done near the end – This slide was placed here for continuity

26 The Manifest Document The Manifest Document bears the Hash codes for the Manifest File (Manifest.XML) which secures the entire project. Print and sign too ! Note: Projects may be re-secured at any time, even if there are no Signatories