SlideShare a Scribd company logo
1 of 30
ADSS Server / Trusted Archive Server   Saving Time & Money, Avoiding Risk & Fraud
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why use ADSS Server Trust Services? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ascertia ADSS Server Integration Options Note: You only need license and use what is needed today ADSS Server Web Services  - via XML/SOAP messaging  - via a provided high level .NET API  - via a provided high level Java API Using ADSS GoSign   - Within a web-browser (GoSign Applet) - Within a desktop .NET app (GoSign .NET) - Within a desktop Java app (GoSign Java) Using ADSS Server Auto File Processor   - For one or more watched folders Using ADSS Gateway for confidentiality  - to extract signatures from documents  Using the Secure eMail Server  - to handle emails and/or attachments ADSS Server HTTP fast interface  - For Signing and Verification services  Sign  Verify             Q3 2008  Q3 2008     -                  
Ascertia ADSS Server Trust Services Note: You only need license and use what is needed today PDF Documents   - Basic signature (visible / invisible)  - Certify  - Sign & timestamp - Long-term signatures XML Documents - XML DSig  (XAdES ES) - Timestamps (XAdES ES-T) - Long-term signatures (XAdES X-Long) PKCS#7 / CMS / SMIME - Basic signature  (CAdES ES) - Timestamps (CAdES ES-T) - Long-term signatures (CAdES X-Long)  Historic Verification OCSP Validation (immediate verify & long term sign) Time Stamp Authority (TSA) Server Sign  Verify                                         -          
ADSS Server Product Architecture  Application Web Services Application Java API Email Gateway Watched Folder OCSP Clients  SCVP clients XKMS clients using HTTP HTTP/S XML/SOAP Synchronous Asynchronous      = Q1 2008
ADSS Notary Signing / Archive Options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Archiving Standards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Archive Server ,[object Object],[object Object],[object Object],[object Object],[object Object]
Interaction with ADSS Server  ADSS Server Trusted Archive Service ADSS Enterprise Server offers a variety of digital signature creation, verification, timestamp client and validation services ADSS Infrastructure server offers CA, TSA and OCSP VA services LTANS Archiving Timestamp client OCSP Client Trusted Archive Server CRL Manager Verification Signature  Draft IETF LTANS processing of archive requests Multi-policy archive management CAs TSA VA Signature Verification Service Signature Generation Service
Trusted Archive Server ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data types that can be archived ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Services offered by Trusted Archive Server ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Submitting basic data Verify request & client  authorisation c Gather Archive Process Meta Data Request timestamp for full archive object c Trusted Archive Server Time Stamp  Authority  (e.g. Ascertia  ADSS TSA Service) DB Meta data  sent by client may include: Filename, Author details, digital signature, etc.  Archive Process Meta data  may include archiving time, retention period, cryptographic info, etc.  ERS  stands for Evidence Record Syntax – this includes the timestamp information obtained from RFC3161 compliant TSA (see next slide)  Hash & Timestamp Submission  by people   or  applications Data Object Meta Data Data Object Meta Data Archive Process Meta Data ERS
Evidence Record Syntax (ERS) <EvidenceRecord> <Version /> <ArchiveTimeStampSequence> <CanonicalizationMethod /> <ArchiveTimeStampChain Order> <DigestMethod /> <ArchiveTimeStamp Order> <HashTree /> * <TimeStamp /> + <CryptographicInformation /> * </ArchiveTimeStamp>) + </ArchiveTimeStampChain> + </ArchiveTimeStampSequence> </EvidenceRecord> An Evidence Record must contain at least one timestamps in the  TimeStampChain Additional timestamps may be added as the old timestamp nears its expiry.  These are all contained within a single  TimeStampChain A new  TimeStampChain  is created with the underlying hash algorithms need to be renewed (due to weakness in original algorithm) Note:  Ascertia ADSS TAS Service will use a timestamp for each data object rather than using hash trees.  This provides best security and immediate response (compared to hash trees) .  Support for Merkle hash trees will be added later
ERS - Timestamp Renewal Structure EvidenceRecord ArchiveTimeStampSequence ArchiveTimeStampChain Order =1 DigestMethod ArchiveTimeStamp  Order =1 TimeStamp Cryptographic Information ArchiveTimeStamp  Order =2 TimeStamp Cryptographic Information ArchiveTimeStampChain Order =2 The first timestamp is over the archive object including meta data Cryptographic Information is used to store CRLs/certs/TAs required to verify the timestamp A new timestamp is requested before expiry of a previous timestamp (or configurable period, e.g. annually).  This timestamp is only over the last timestamp.  A new chain is created when the digest algorithm is changed.  Note this timestamp will be over original data object and all previous chains
Verify / Archive Signed Data Meta Data (e.g. detached signature) Verify request & client authorization c Gather Archive Process Meta Data Request timestamp for full archive object c Time Stamp  Authority  (e.g. Ascertia  ADSS TSA Service) DB Meta data:  may include detached signature, alternatively signature maybe enveloped inside document (e.g. signed PDF) Archive Process Meta data:  signature will be verified, certificate chains, CRL/OCSP responses and final Trust Anchors (TAs) will be added as archive process meta data Verify signatures by gathering cert chains, OCSP responses, TAs OCSP  Responder  (e.g. Ascertia  ADSS OCSP Service) ,[object Object],[object Object],[object Object],Trusted Archive Server Data Object
Verify / Archive Options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Note: ADSS Server Verification Service already supports the  verification of all these complex and advanced signatures!
Notary Signing and Archiving Meta Data (e.g. detached signature) Verify request & client authorization c Gather Archive Process Meta Data Request timestamp for full archive object c Time Stamp  Authority  (e.g. Ascertia  ADSS TSA Service) DB Archive Meta data  will include a notary signature over the Archive Data object.  This can be PKCS#7/CMS signature or XML DigSig ERS  will cover the notary signature so that the whole package including notary signature is protected for long-term Compute a signature over Archive Object HSM  (e.g. SafeNet  LunaSA) Trusted Archive Server Signed Data Object
ADSS Server – Admin Console ,[object Object],[object Object],[object Object],Service Modules Utility Modules
ADSS Server – Customer Console ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Archive Profiles – to enforce controls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Multiple Profiles can be defined within ADSS Trusted Archive Service (TAS)  Client requests can reference the Archive Profile to be used (or the default one will be used) ADSS Client Manager defines which clients can use which Archive Profiles
Archive Profile – continued  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Storage within an ECM System Meta Data (e.g. detached signature) Verify request and ECM system authorisation c Create response and send to ECM using identifiers provided in the request, logs to DB c ADSS TAS Service DB Process Archive Service request (Archive, Verify, Export, Search Request System:   Could be any system, but expected to be the ECM (or EPM, ERP or CRM) system ERS data:  This is not stored in ADSS TAS database area but passed back to defined ECM system for secure storage and retrieval under given identifiers.  ECM system is responsible for storing data Object, Meta data, Archive Process Meta Data and ERS data Transaction Data:  The request / response details are held by ADSS Server within the TAS transaction log and the actions and results can be viewed there, provides details of ECM storage identifiers Archive Process Meta Data ERS data ECM  System Archive request Archive response/ data management Option to return all data to the ECM environment Data Object c LOGS
Authenticating and Authorising Clients ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Archive Server Security  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ADSS Server Scalability / Resilience CRLs CRLs CRLs OCSP OCSP OCSP Hardware Load Balancer ADSS Server Database replication E.g. Big-IP Cisco HSM 1 ADSS Server HSM 2 SQL Server or Oracle or PostgreSQL Archive requests and responses  Option for 1 or more CAs supported Optional HSMs  CA 1 CA 2 CA n
Use Case Example - Workflow Archive services  Request Sign Protect Review Approve Countersign Later audit / review ERP CRM ECM Verify Verify ADSS Server + TAS Sign & Timestamp Evidence Archive Approval required business flows Approval granted business flows
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions: Rod Crook +44 1256 895416 [email_address]

More Related Content

Viewers also liked

Wood steel-winter-2013-spanish
Wood steel-winter-2013-spanishWood steel-winter-2013-spanish
Wood steel-winter-2013-spanishMarita Cy
 
24. Festival Radovljica 2006-programme
24. Festival Radovljica 2006-programme24. Festival Radovljica 2006-programme
24. Festival Radovljica 2006-programmeTjaša Krajnc
 
Creatividad Estratégica - MA Planner at Zink! Project
Creatividad Estratégica - MA Planner at Zink! ProjectCreatividad Estratégica - MA Planner at Zink! Project
Creatividad Estratégica - MA Planner at Zink! ProjectJoaquín Palomares
 
El PUNTO G - Julio
El PUNTO G - JulioEl PUNTO G - Julio
El PUNTO G - JulioPUNTO-G
 
La sirena de_las_belugas
La sirena de_las_belugasLa sirena de_las_belugas
La sirena de_las_belugascreacionesdanae
 
Presentacin web-20-6287
Presentacin web-20-6287Presentacin web-20-6287
Presentacin web-20-6287sebastianrm
 
Situational Writing - Personal Email Writing
Situational Writing - Personal Email WritingSituational Writing - Personal Email Writing
Situational Writing - Personal Email WritingGoh Bang Rui
 
La nanoelectrónica
La nanoelectrónicaLa nanoelectrónica
La nanoelectrónicaFEPCMAC
 
Mobisoft Infotech iphone & android apps portfolio
Mobisoft Infotech iphone & android apps portfolio Mobisoft Infotech iphone & android apps portfolio
Mobisoft Infotech iphone & android apps portfolio Mobisoft Infotech LLC
 

Viewers also liked (14)

Seguridad en redes
Seguridad en redesSeguridad en redes
Seguridad en redes
 
Wood steel-winter-2013-spanish
Wood steel-winter-2013-spanishWood steel-winter-2013-spanish
Wood steel-winter-2013-spanish
 
24. Festival Radovljica 2006-programme
24. Festival Radovljica 2006-programme24. Festival Radovljica 2006-programme
24. Festival Radovljica 2006-programme
 
Aena News. Issue 7
Aena News. Issue 7Aena News. Issue 7
Aena News. Issue 7
 
Creatividad Estratégica - MA Planner at Zink! Project
Creatividad Estratégica - MA Planner at Zink! ProjectCreatividad Estratégica - MA Planner at Zink! Project
Creatividad Estratégica - MA Planner at Zink! Project
 
El PUNTO G - Julio
El PUNTO G - JulioEl PUNTO G - Julio
El PUNTO G - Julio
 
Slideshare
SlideshareSlideshare
Slideshare
 
La sirena de_las_belugas
La sirena de_las_belugasLa sirena de_las_belugas
La sirena de_las_belugas
 
Convocatorias de personal (10 nov-10)
Convocatorias de personal (10 nov-10)Convocatorias de personal (10 nov-10)
Convocatorias de personal (10 nov-10)
 
Presentacin web-20-6287
Presentacin web-20-6287Presentacin web-20-6287
Presentacin web-20-6287
 
Etapas diseño implementación IG DO en CAFE HONDURAS
Etapas diseño implementación IG DO en CAFE HONDURASEtapas diseño implementación IG DO en CAFE HONDURAS
Etapas diseño implementación IG DO en CAFE HONDURAS
 
Situational Writing - Personal Email Writing
Situational Writing - Personal Email WritingSituational Writing - Personal Email Writing
Situational Writing - Personal Email Writing
 
La nanoelectrónica
La nanoelectrónicaLa nanoelectrónica
La nanoelectrónica
 
Mobisoft Infotech iphone & android apps portfolio
Mobisoft Infotech iphone & android apps portfolio Mobisoft Infotech iphone & android apps portfolio
Mobisoft Infotech iphone & android apps portfolio
 

Similar to Adss Server Trusted Archive Services (Tas Aug08)

Ascertia Secure E Mail Server (Jul08)
Ascertia Secure E Mail Server (Jul08)Ascertia Secure E Mail Server (Jul08)
Ascertia Secure E Mail Server (Jul08)andrei_gosman
 
Ascertia Adss Server Capabilities
Ascertia Adss Server CapabilitiesAscertia Adss Server Capabilities
Ascertia Adss Server Capabilitiesandrei_gosman
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXCisco Canada
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)NYversity
 
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...Amazon Web Services
 
SRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery NetworkSRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery NetworkAmazon Web Services
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6phanleson
 
Ascertia Adss Server Signing & Verifying
Ascertia Adss Server Signing & VerifyingAscertia Adss Server Signing & Verifying
Ascertia Adss Server Signing & Verifyingandrei_gosman
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Toni de la Fuente
 
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...RootedCON
 
AWS CSAA Certification - Mindmaps and StudyNotes
AWS CSAA Certification -  Mindmaps and StudyNotesAWS CSAA Certification -  Mindmaps and StudyNotes
AWS CSAA Certification - Mindmaps and StudyNotesDaniel Fonseca
 
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EUBuilding Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EUYaron Haviv
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security Sandeep Patil
 
Single Sign On using ADFS.pptx
Single Sign On using ADFS.pptxSingle Sign On using ADFS.pptx
Single Sign On using ADFS.pptxAlireza Vafi
 

Similar to Adss Server Trusted Archive Services (Tas Aug08) (20)

Ascertia Secure E Mail Server (Jul08)
Ascertia Secure E Mail Server (Jul08)Ascertia Secure E Mail Server (Jul08)
Ascertia Secure E Mail Server (Jul08)
 
trusted archiving authority - LTANS
trusted archiving authority - LTANStrusted archiving authority - LTANS
trusted archiving authority - LTANS
 
Ascertia Adss Server Capabilities
Ascertia Adss Server CapabilitiesAscertia Adss Server Capabilities
Ascertia Adss Server Capabilities
 
Deep Dive In To Kerberos
Deep Dive In To KerberosDeep Dive In To Kerberos
Deep Dive In To Kerberos
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
Deep Dive on Accelerating Content, APIs, and Applications with Amazon CloudFr...
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
SRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery NetworkSRV206 Getting Started with Amazon CloudFront Content Delivery Network
SRV206 Getting Started with Amazon CloudFront Content Delivery Network
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6
 
Ascertia Adss Server Signing & Verifying
Ascertia Adss Server Signing & VerifyingAscertia Adss Server Signing & Verifying
Ascertia Adss Server Signing & Verifying
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017Automate or die! Rootedcon 2017
Automate or die! Rootedcon 2017
 
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
 
AWS CSAA Certification - Mindmaps and StudyNotes
AWS CSAA Certification -  Mindmaps and StudyNotesAWS CSAA Certification -  Mindmaps and StudyNotes
AWS CSAA Certification - Mindmaps and StudyNotes
 
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EUBuilding Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
Building Super Fast Cloud-Native Data Platforms - Yaron Haviv, KubeCon 2017 EU
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
SSL
SSLSSL
SSL
 
Single Sign On using ADFS.pptx
Single Sign On using ADFS.pptxSingle Sign On using ADFS.pptx
Single Sign On using ADFS.pptx
 
Web Security
Web SecurityWeb Security
Web Security
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Adss Server Trusted Archive Services (Tas Aug08)

  • 1. ADSS Server / Trusted Archive Server Saving Time & Money, Avoiding Risk & Fraud
  • 2.
  • 3.
  • 4. Ascertia ADSS Server Integration Options Note: You only need license and use what is needed today ADSS Server Web Services - via XML/SOAP messaging - via a provided high level .NET API - via a provided high level Java API Using ADSS GoSign - Within a web-browser (GoSign Applet) - Within a desktop .NET app (GoSign .NET) - Within a desktop Java app (GoSign Java) Using ADSS Server Auto File Processor - For one or more watched folders Using ADSS Gateway for confidentiality - to extract signatures from documents Using the Secure eMail Server - to handle emails and/or attachments ADSS Server HTTP fast interface - For Signing and Verification services Sign Verify       Q3 2008 Q3 2008   -         
  • 5. Ascertia ADSS Server Trust Services Note: You only need license and use what is needed today PDF Documents - Basic signature (visible / invisible) - Certify - Sign & timestamp - Long-term signatures XML Documents - XML DSig (XAdES ES) - Timestamps (XAdES ES-T) - Long-term signatures (XAdES X-Long) PKCS#7 / CMS / SMIME - Basic signature (CAdES ES) - Timestamps (CAdES ES-T) - Long-term signatures (CAdES X-Long) Historic Verification OCSP Validation (immediate verify & long term sign) Time Stamp Authority (TSA) Server Sign Verify                     -     
  • 6. ADSS Server Product Architecture Application Web Services Application Java API Email Gateway Watched Folder OCSP Clients SCVP clients XKMS clients using HTTP HTTP/S XML/SOAP Synchronous Asynchronous    = Q1 2008
  • 7.
  • 8.
  • 9.
  • 10. Interaction with ADSS Server ADSS Server Trusted Archive Service ADSS Enterprise Server offers a variety of digital signature creation, verification, timestamp client and validation services ADSS Infrastructure server offers CA, TSA and OCSP VA services LTANS Archiving Timestamp client OCSP Client Trusted Archive Server CRL Manager Verification Signature Draft IETF LTANS processing of archive requests Multi-policy archive management CAs TSA VA Signature Verification Service Signature Generation Service
  • 11.
  • 12.
  • 13.
  • 14. Submitting basic data Verify request & client authorisation c Gather Archive Process Meta Data Request timestamp for full archive object c Trusted Archive Server Time Stamp Authority (e.g. Ascertia ADSS TSA Service) DB Meta data sent by client may include: Filename, Author details, digital signature, etc. Archive Process Meta data may include archiving time, retention period, cryptographic info, etc. ERS stands for Evidence Record Syntax – this includes the timestamp information obtained from RFC3161 compliant TSA (see next slide) Hash & Timestamp Submission by people or applications Data Object Meta Data Data Object Meta Data Archive Process Meta Data ERS
  • 15. Evidence Record Syntax (ERS) <EvidenceRecord> <Version /> <ArchiveTimeStampSequence> <CanonicalizationMethod /> <ArchiveTimeStampChain Order> <DigestMethod /> <ArchiveTimeStamp Order> <HashTree /> * <TimeStamp /> + <CryptographicInformation /> * </ArchiveTimeStamp>) + </ArchiveTimeStampChain> + </ArchiveTimeStampSequence> </EvidenceRecord> An Evidence Record must contain at least one timestamps in the TimeStampChain Additional timestamps may be added as the old timestamp nears its expiry. These are all contained within a single TimeStampChain A new TimeStampChain is created with the underlying hash algorithms need to be renewed (due to weakness in original algorithm) Note: Ascertia ADSS TAS Service will use a timestamp for each data object rather than using hash trees. This provides best security and immediate response (compared to hash trees) . Support for Merkle hash trees will be added later
  • 16. ERS - Timestamp Renewal Structure EvidenceRecord ArchiveTimeStampSequence ArchiveTimeStampChain Order =1 DigestMethod ArchiveTimeStamp Order =1 TimeStamp Cryptographic Information ArchiveTimeStamp Order =2 TimeStamp Cryptographic Information ArchiveTimeStampChain Order =2 The first timestamp is over the archive object including meta data Cryptographic Information is used to store CRLs/certs/TAs required to verify the timestamp A new timestamp is requested before expiry of a previous timestamp (or configurable period, e.g. annually). This timestamp is only over the last timestamp. A new chain is created when the digest algorithm is changed. Note this timestamp will be over original data object and all previous chains
  • 17.
  • 18.
  • 19. Notary Signing and Archiving Meta Data (e.g. detached signature) Verify request & client authorization c Gather Archive Process Meta Data Request timestamp for full archive object c Time Stamp Authority (e.g. Ascertia ADSS TSA Service) DB Archive Meta data will include a notary signature over the Archive Data object. This can be PKCS#7/CMS signature or XML DigSig ERS will cover the notary signature so that the whole package including notary signature is protected for long-term Compute a signature over Archive Object HSM (e.g. SafeNet LunaSA) Trusted Archive Server Signed Data Object
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Data Storage within an ECM System Meta Data (e.g. detached signature) Verify request and ECM system authorisation c Create response and send to ECM using identifiers provided in the request, logs to DB c ADSS TAS Service DB Process Archive Service request (Archive, Verify, Export, Search Request System: Could be any system, but expected to be the ECM (or EPM, ERP or CRM) system ERS data: This is not stored in ADSS TAS database area but passed back to defined ECM system for secure storage and retrieval under given identifiers. ECM system is responsible for storing data Object, Meta data, Archive Process Meta Data and ERS data Transaction Data: The request / response details are held by ADSS Server within the TAS transaction log and the actions and results can be viewed there, provides details of ECM storage identifiers Archive Process Meta Data ERS data ECM System Archive request Archive response/ data management Option to return all data to the ECM environment Data Object c LOGS
  • 25.
  • 26.
  • 27. ADSS Server Scalability / Resilience CRLs CRLs CRLs OCSP OCSP OCSP Hardware Load Balancer ADSS Server Database replication E.g. Big-IP Cisco HSM 1 ADSS Server HSM 2 SQL Server or Oracle or PostgreSQL Archive requests and responses Option for 1 or more CAs supported Optional HSMs CA 1 CA 2 CA n
  • 28. Use Case Example - Workflow Archive services Request Sign Protect Review Approve Countersign Later audit / review ERP CRM ECM Verify Verify ADSS Server + TAS Sign & Timestamp Evidence Archive Approval required business flows Approval granted business flows
  • 29.
  • 30. Questions: Rod Crook +44 1256 895416 [email_address]