E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant.

Slides:



Advertisements
Similar presentations
Mr. Aivars Paegle, Legal manager at The Register of Enterprises of the Republic of Latvia, Juridical Division Workshop on Single Institution for Registration.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Stamps of Companies Tarvi Martens SK, Estonia.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
Civil Registry Agency of the Ministry of Justice, Georgia Digital Signature Services in Georgia Mikheil Kapanadze.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
1 Review of the Electronic Transactions Ordinance Information Infrastructure Advisory Committee 9 April 2002.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
The Estonian Electronic Signature Legislation and case studies EESSI Seminar Budapest, Taavi Valdlo Estonian Informatics Centre
Can PKI be made simple enough to be used by non-experts? Signature formats and context Antonio Lioy ( polito.it ) Politecnico di Torino Dip. Automatica.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Cryptography 101 Frank Hecker
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
National Smartcard Project Work Package 8 – Security Issues Report.
Chapter 31 Network Security
FINANCIAL PORTAL FOR BUSINESS CUSTOMERS. BTA-ONLINE SYSTEM FOR LEGAL ENTITIES БТА-ONLINE services of financing portal allows to make banking transactions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
"certification service provider" Electronic Signatures
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure Electronic Transaction (SET)
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Meganet Corporation VME Sign Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Digital Signatures, Message Digest and Authentication Week-9.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
Welcome to the Introduction of Digital Signature Submitted By: Ankit Saxena.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Session 52-1 Session 52 E-Signature: Implications of the E-SIGN Legislation for Student Aid 1.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
© Software602 a.s. SOFTWARE Zdenek Metodej Zalis Martin Vondrous Ondrej Malek.
ESign Aashutosh.
eSignature Today and in the Future
Digital Signature.
Secure Electronic Transaction (SET) University of Windsor
Automated Bulk Signing Solution
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
PKI (Public Key Infrastructure)
National Trust Platform
Presentation transcript:

E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant

Background Information 2 Conditions precedent: From commercial banks’ side: General readiness and maturity for the engagement into e-business From NBG’s side: Creating reliable and trustworthy environment for utilizing electronic signature Essential components for replacing paper based document to e-doc: Creation of Electronic Document with Electronic Signature Creation E-signed Document Management System

E-Signed DocFlow System 3 Purpose Scope: Centralization of Electronic Document Management system in Banking Sector E-Signed DocFlow System Users: Bank clients Any Third Party (e.g. Court, law enforcement … Companies)

ESDS in Action 4 Purpose Scope: Centralization Electronic Document Management system in Banking Sector E-Signed DocFlow System Users : Customer of Banking Sector Any Third Party

While administering ESDS the NBG ensures: 5 Receive the Electronic document directly from a Bank Security of the Electronic Signature Integrity of the Electronic Document Possibility to Detect ANY changes in the Electronic Document Signature Non-repudiation (by signatory ) Environment Possibility to Access Safely the Electronic Document Possibility of Signatory Identification after the signing Possibility to Archiving Securely Electronic D for a long time

Simple way to received E-signed Document 6 YOU have to: Sign E-document by using Your Signature Biometric Data You automatically receive E-Doc ID and Pin code You can use any Internet connected device for receiving E-Doc Visit Enter E-Doc ID / then Pin code Enter (don’t forget : ) “search” The ORIGINAL VERSION of The E-Signed Doc IS in YOUR device

For YOU & for Third Parties 7 If you are the signer you can: Receive the Original Version of E-Doc any time Using the same PIN cod for 5 days Multiple times Request NEW Pin cod Any time Send Doc ID and Pin cod to ANY Third Party - It is your right! Third Party – receive YOUR E-signed Doc: Use

E-Signed Doc in Banking Sector 8

Project participants 9 National Bank of Georgia _ Assess ES service providers (TSP) and approves commercial bank’s security policy Commercial Bank _ Creates reliable and trustworthy environment Electronic Signature Creation Device supplier - TSP Digital Signature Certificate Authority (CA) - TSP Biometric data encription key pare generated body - TSP Time Stamp service provider - TSP Signatory Expertize Bureau

Handwritten Electronic Signature 10

Minimum Technical Requirements – Biometric data _ ISO standard ISO/IEC :2007(E) – Public-key cryptosystem _ RSA – Key length _ 2048 bit – Cryptographic hash function _ SHA256 – Public-Key Certificate _ X.509 – Time Stamp protocol _ RFC 3161 (cryptographic time-stamp) – PDF A/ - 2a format document _ Long term validation 11

E-Document Structure in Banking Sector I _ Customer’s signature: – Client’s encrypted biometric data – Client’s encrypted biometric data is embeded to the document – Integrity of the document is ensured by digital signature certificate ( I certificate) – Cryptographic Time-Stamp is used for first digital signature II _ Bank’s signature _ Signatory – physical entity: – Client’s encrypted biometric data – Client’s encrypted biometric data is embeded to the document – Integrity of the document is ensured by digital signature certificate ( I certificate) – Cryptographic Time-Stamp is used for second digital signature III _ Electronic Stamp: – CA issues Signature digital certificate to the Bank _ Stamp certificate (II certificate) – Client’s encrypted biometric data is embeded to the document – Integrity of the document is ensured by digital signature certificate – Cryptographic/Local Time-Stamp is used for Electronic Stamp 12

NBG COMPETITIVE STRENGTH Successful implementation of Advanced ES in banking sector means: – Utilizing ES according The Directive requirements – Favorable legislative environment _ appropriate amendments and methodological guidelines performed by NBG – Ability and readiness to regulate complex technical solution from NBG's side – Availability of expertize (forensic analysis) of handwritten electronic & digital signature – Commensurate readiness among the major commercial banks 13

NEXT STEPS IN FINANCIAL SECTOR Availability of Distance performing 100% Banking operations 14

Electronic Signature in Banking Sector Thank You 15