Session 64 Digital Signatures Presented by: Bob Peterson, P.E. Engineering Technology Systems.

Slides:



Advertisements
Similar presentations
S the of partnership power Evaluation Code 030 Presenter: Laura Key, Taylor University Monday, April 9th - 8:30 AM Building a Self- Refreshing MS Access.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Help File For User Creation Click the “Course” button for Creating/Add User.
Where to start?. Step 1: Register or Login 1 st time, click & register, otherwise click login and we will help you if you forget your password.
E-Gov Presented by Technical Services An electronic imaging system for accessing Harris County case records.
Safe Script CA Digital Certificate Enrollment Guide With
Digital Certificate Installation & User Guide For Class-2 Certificates.
Kyira Hauer; Associate Director; NAMI Wisconsin (608) ; Presented By: NAMI Wisconsin Affiliate Profile Center Training.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Instructional Services 8/091 Introduction to Your OUSD and OUSD Technology Applications Leah Jensen, Instructional Technologist (510)
1 Linking & Consolidating Worksheets Applications of Spreadsheets.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Online Security Tuesday April 8, 2003 Maxence Crossley.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
Data Security 101 Part 1: PKI and SSL. Reading First, read the VeriSign case, –page Second, read section 5.3 –pages Finally, briefly skim.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
IPhone Security: Understanding the KeyChain Nicholis Bufmack and Ryan Thomas CS 691 Summer 2009.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
By Jyh-haw Yeh Boise State University ICIKM 2013.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
NSF FastLane Division of Sponsored Research Presents:
National Energy Research Scientific Computing Center (NERSC) Computer Security – The New Threats Stephen Lau NERSC Center Division, LBNL June 24, 2004.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
IIS Home Screen (Teacher) Copyright © 2011 Pearson Education, Inc. or its affiliates. All rights reserved.1.
Login/Logout Procedures. Login – Windows XP Greeted by Technology Usage Agreement 1. User name text box 2-digit grad. Yr. + first initial + last name.
UNCLASSIFIED NGA NIPRNET Presentation to FLIP Coordinating Committee, Digital Working Group Larry Glick, (314) , Aeronautical.
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
Destiny library.qf.org.qa User guide on how to use the library search facility of the senior school library.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
National Computational Science National Center for Supercomputing Applications National Computational Science Credential Management in the Grid Security.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
How to Deploy and Get the Most Out of Tokens Paul Caskey PKI Deployment Forum 2008.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
In order for Cardholders to enroll in the internet Payment Center tool, they need to copy and paste the following URL in the address bar:
Computer and Network Security - Message Digests, Kerberos, PKI –
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Understand Permissions LESSON Security Fundamentals.
Electronic Filing Systems for Campaign and Finance Reports Subcommittee Report on Security and Authentication in Filing Systems Information Network of.
LAB#8 PKI & DIGITAL CERTIFICATE CPIT 425. Public Key Infrastructure PKI 2  Public key infrastructure is the term used to describe the laws, policies,
Digital Disruption, Alfresco, and Digital Signatures Brian LaPointe VP Sales, Americas CoSign by ARX.
This is the Home Page, enter your username and password.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Bank of America Works ™ Secretarial Clerical In-Service August 16, 2013 Presenter : Bob Hutchinson
Windows XP Professional Not Finish Yet
Windows 94
CITI Course Verification
Installation & User Guide
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
CITI Course Verification
IMPACT SAMR Cover Sheet
Training Presentation For
Why We Need Car Parking Systems - Wohr Parking Systems
Types of Stack Parking Systems Offered by Wohr Parking Systems
Add Title.
Presentation transcript:

Session 64 Digital Signatures Presented by: Bob Peterson, P.E. Engineering Technology Systems

Obtain Certificate PKI Technology – Private key vs. Public key Class 2 certificate –Verification of identity (Certificate Authority) –“This is me” Token vs. Computer –Token is portable and provides two-part security (physical token and password) –Computer storage uses window login password Where to get certificate? –Verisign, Digitrust, Adobe affiliates, Usertrust

Create Signature Cell Library Follow directions found in “Signature Cell Creation.pdf” file Caution – If you lose your certificate, you will lose your cell library

Digital Signature Process for Construction Plans

Types of Signatures Plan sheet signature –Make sure all signatures are valid when assembling final set –Do not change any files (turn off save settings on exit) Title Sheet or Cover Sheet –Multiple signatures – only add signatures to avoid invalidating previous signatures Adobe Signature –Udot.pen creation of signature fields –Reader accessible file

Resource Locations UDOT –M:\Cadd_Apps\Signature_Tokens\ Consultants and Contractors –ftp://ftp.dot.utah.gov/COMPLEX/CADD_Supp ort/Digital_Signatures/