SlideShare a Scribd company logo
1 of 35
Download to read offline
Certificate Authority for Internal
Use Plus e-Tax and e-Policy
1, Soi Phutthabucha 2,Phutthabucha Rd.,
Bangmod Sub district.
Jomthong District, Bangkok 10150, Thailand.
Tel : +66(0)24278216 Fax : +66(0)24278217
Mobile : +66(0)61-6394914 ,+66(0)86-4144392
Line ID : Ohayo007
COVERSPACE CO., LTD.
2
DIGITAL CERTIFICATES
3
Real World ID Certificates
> Proving who you are in the real world
> The government (TTP) vouches for identity
> If the certificate looks authentic, identifying marks, as picture,
identify the person
> Printed to make it hard to forge
Name: James Bond
Address: Somewhere
Date of Birth: 1954
State of Fleming– ID certificate
4
Digital Certificates – Digital ID
>A Digital document,
containing the public key +
identity information, digitally
signed by a Certificate
Authority (CA).
>The public key replaces the
photo For digitally verifying
the user’s identity.
>If the CA is trusted, a
Challenge-Response
protocol can be used for
authentication.
Name: James Bond
email james@serv.com
Public Key: 1f 0a 01 15 96
9a 5a 1c cc ab 1b f1 13 e8
Expiry Date: 3/5/00
CA Name: VeriSign
CA Signature: 15 2f 36 1a
5
Real vs. Digital Certificates
Name: James Bond
Address: Somewhere
Date of Birth: 1954
State of Fleming– ID certificate Name: James Bond
email james@serv.com
Public Key: 1f 0a 01 15 96
9a 5a 1c cc ab 1b f1 13 e8
Expiry Date: 3/5/00
CA Name: VeriSign
CA Signature: 15 2f 36 1a
> A means of proving identity:
In Person / Digitally
> The issuer vouches for James’ Identity:
The government / a Certification Authority
> If the certificate is found authentic, James can be identified by
his:
Looks (Picture) / Digital Signature (Based on Public Key)
> Signed by: Government / the CA
6
Digital Signature
> A digital signature is a small amount of data that was created
using a Private Key
> The user’s own Private Key is used to sign the data
> The user’s Public Key is used to verify that the signature was
really generated using the corresponding Private Key
> Digital signatures are used to verify that a message really
comes from the claimed sender
… assuming only the sender holds the Private Key
corresponding to the verifying Public Key)
7
Features of Digital Signatures
> A digital signature should:
> Be unforgeable (convince us that Alice signed – origin of data)
> Authenticate (prevent anyone from changing the document after it has
been signed)
> Be hard to copy (remain secure even after seeing many signatures)
> Important property – non-repudiation:
> The owner of the signature cannot later deny that she signed (provides
“proof of order”)
> This is essential for electronic commerce and accountability
> Digital signatures are messages that are hashed and then encrypted
by the private key
> The private key is essential for signing
> To verify the signature, we must be sure of the Public Key owner’s
identity
8
One-Way Hash Algorithms
> Reduce a variable size block of data to a small – fixed size value
called hash value
> Operate one way – the original data cannot be derived from the
hash value
> The same data will always yield the same hash value
> It is very hard to find different data blocks with the same hash value
(in reasonable time). Therefore, in reality, different data blocks will
yield different hash values.
Hashing
Algorithm
Data 100110101
Hash Value
Different
Data
011010111
Different
9
Using Hash for Digital Signing
Verification
(Decryption)
Hashing
Algorithm
Signing
(Encryption)
Hashing
Algorithm
1101011011
Bob
(Sender)
Alice
(Receiver)
Plain Text Message +
Signature
Compare!
Bob’s Private
Key
Bob’s Public
Key
1101011011
1101011011
10
Whom Do We Trust?
> When doing business, there has to be a body we trust to issue
certificates
> The trusted party that issues certificates to the identified entities is
the Certification Authority (CA).
> Policies ensure that every certificate applicant goes through a known procedure
that verifies his/her identity
> Policies enable clients of the CA to evaluate the amount of trust that can be
given to a digital certificate
> As a common Trusted Third Party, the CA enables two individuals to
trust each other’s authenticity
> By holding the CA’s Public Key (Root Certificate), users can validate
the signature of certified users – by trusting the authenticity of their
public keys.
11
Trusting the Root Certificate
> Existing Root certificates can be view through the
Content tab in IE Tools Internet Options
12
Internal CA Hierarchy
> Root CA
> Most trusted certificate
> Best security
> Least accessibility
> Others
> With distance from root
> Decreasing security
> Increasing accessibility
Accessibility Security
Root CA
Intermediate
CA1
Intermediate
CA2
End Users
13
Use Case: eDocuments
14
Industry Challenge:
Moving from paper to digital documents improves efficiencies for invoice processing,
storage, and retrieval while eliminating the cost and complexity of issuing and storing
large amounts of paper based invoices.
Security Challenge:
To instill confidence in eDocuments security measures must be taken to establish
trust as documents change hands, ensure document integrity, and prevent
repudiation
Role of HSMs:
HSMs are the cornerstone for establishing this trust- safeguarding the cryptographic
keys that will sign/verify the documents, providing security in the digital process, and
ensuring trust across all parties.
Benefits:
Data is secured and stored to produce electronic evidence. Relieves administrative
burden by reducing the risk of human error. Increases productivity for lower overall
costs.
Moving from Paper to Digital: eDocuments
Why are HSMs needed?
15
Secure Digital Documents
Why SafeNet HSMs are the right fit for eDocument Schemes
SafeNet HSMs offer the robust security capabilities that ensure compliance
with the European Directive on Invoicing, Brazil Notal Fiscal (NF-e), and other
regulations.
SafeNet HSMs are highly secure FIPS 140-2 and Common Criteria certified
appliances capable of providing the high entropy key material required in
eDocument schemes.
Centralizing cryptographic keys and policy management on SafeNet HSMs allows
businesses to significantly reduce the administration associated with managing digital
signatures in a distributed, disparate fashion.
With a secure , high performance, eDocument system in place, organizations are
well equipped to integrate digital documents with other backend applications,
such as procurement and enterprise resource planning, which can lead to further
efficiency and accuracy gains.
16
Deployment Example
The role of HSMs in secure eDocument processes
17
Deployment Example
The role of HSMs in secure eDocument processes
18
Sample Certificate
19
Corporate Digital Sign Sample
20
Digital Sign Properties
21
Counter Digital Sign Sample
22
Tax Invoice Sample
23
Standard Document System
SMTP
eMail Server
ERP System
Receipt Printing
Staff
Automated
Billing System
Mass Printing
Standard Mail
24
Smartcard
Contact, Contactless and Physical Access
Supported Solutions
> Remote access (VPN)
> Network access
> Proximity access
> Digital signing
> Data security
> Picture ID Badge
Certifications*
> FIPS 140-2 certified
> Common Criteria certified
25
Digital Sign Policy System
SMTP
eMail Server
Policy System
Receipt Printing
Users Automated
Printing System
Mass Printing
Standard Mail
Traditional
Printing System
26
Luna SA HSM
SafeNet Luna SA – Network Attached HSM
FIPS 140-2 Level 3 and Common Criteria EAL4+
validated
Trusted Keys in Hardware
Segregated DNS Domain key storage (100 partitions)
High Performance – 7,000 tps
Key Storage capabilities – Scale 10,000 keys/per HSM
27
Automated Digital Sign Policy System
SMTP
eMail Server
Policy System
Receipt Printing
Users Automated
Printing System
Mass Printing
Standard Mail
HSM
Traditional
Printing System
28
Document Signing Software
28
29
PDF Signing Diagram
Policy System
eMail Server
HSM
Unsigned PDF Signed PDF
Signing Software / API Coding
Online Customer
30
PDF Signing Result
30
31
XML Signing Diagram 01
Policy System
eMail Server
HSM
Unsigned XML Signed XML
Signing Software / API Coding
Online Customer
32
XML Signing Diagram 02
Policy System
eMail Server
HSM
Signed PDF
Signing Software / API Coding
Revenue Department
Database
Online Customer
33
Unsigned XML File
33
34
Signed XML File
34
35
35

More Related Content

What's hot

Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Digital Signature
Digital SignatureDigital Signature
Digital SignatureRahul Yadav
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Digital signature
Digital signatureDigital signature
Digital signatureRenu Verma
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146IJRAT
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signatureNetri Chowdhary
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Project security
Project securityProject security
Project securitymaryam H
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 

What's hot (20)

Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
 
Digital signature
Digital signatureDigital signature
Digital signature
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Blockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from PatentsBlockchain Privacy Innovation Insights from Patents
Blockchain Privacy Innovation Insights from Patents
 
Esign or Electronic Signature
Esign or Electronic SignatureEsign or Electronic Signature
Esign or Electronic Signature
 
Blockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from PatentsBlockchain Interoperability Innovation Insights from Patents
Blockchain Interoperability Innovation Insights from Patents
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146
 
Digital certificate & signature
Digital certificate & signatureDigital certificate & signature
Digital certificate & signature
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Project security
Project securityProject security
Project security
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 

Similar to CoverSpace : Certificate authority for internal use plus e tax and e-policy01

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & SecurityMichael Bromby
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSCAbhishek Taxxinn
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 

Similar to CoverSpace : Certificate authority for internal use plus e tax and e-policy01 (20)

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Identity & Security
Digital Identity & SecurityDigital Identity & Security
Digital Identity & Security
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
120 i143
120 i143120 i143
120 i143
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital Signature Certificate
Digital Signature CertificateDigital Signature Certificate
Digital Signature Certificate
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Digital Signature Certificate DSC
Digital Signature Certificate DSCDigital Signature Certificate DSC
Digital Signature Certificate DSC
 
E-Business security
E-Business security E-Business security
E-Business security
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 

More from Damrongsak Kobtakul

More from Damrongsak Kobtakul (6)

Alad k1220 t-g ds-en [1]
Alad k1220 t-g ds-en [1]Alad k1220 t-g ds-en [1]
Alad k1220 t-g ds-en [1]
 
CoverSpace solution v. 05
 CoverSpace solution v. 05 CoverSpace solution v. 05
CoverSpace solution v. 05
 
CoverSpace : E-tax invoice & e-receipt (version 2.2)
CoverSpace : E-tax invoice &  e-receipt (version 2.2)CoverSpace : E-tax invoice &  e-receipt (version 2.2)
CoverSpace : E-tax invoice & e-receipt (version 2.2)
 
CoverSpace cloud VS physical sever
CoverSpace cloud VS physical severCoverSpace cloud VS physical sever
CoverSpace cloud VS physical sever
 
CoverSpace cloud (iaas only)
CoverSpace cloud  (iaas only)CoverSpace cloud  (iaas only)
CoverSpace cloud (iaas only)
 
Cover space solution v. 02
 Cover space solution v. 02 Cover space solution v. 02
Cover space solution v. 02
 

Recently uploaded

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTSJHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTSkajalroy875762
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in Escort service book now
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in  Escort service book nowSRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in  Escort service book now
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
PITHAMPUR 💋 Call Girl 9827461493 Call Girls in Escort service book now
PITHAMPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPITHAMPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PITHAMPUR 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 

Recently uploaded (20)

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTSJHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in Escort service book now
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in  Escort service book nowSRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in  Escort service book now
SRI GANGANAGAR 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
PITHAMPUR 💋 Call Girl 9827461493 Call Girls in Escort service book now
PITHAMPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPITHAMPUR 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PITHAMPUR 💋 Call Girl 9827461493 Call Girls in Escort service book now
 

CoverSpace : Certificate authority for internal use plus e tax and e-policy01

  • 1. Certificate Authority for Internal Use Plus e-Tax and e-Policy 1, Soi Phutthabucha 2,Phutthabucha Rd., Bangmod Sub district. Jomthong District, Bangkok 10150, Thailand. Tel : +66(0)24278216 Fax : +66(0)24278217 Mobile : +66(0)61-6394914 ,+66(0)86-4144392 Line ID : Ohayo007 COVERSPACE CO., LTD.
  • 3. 3 Real World ID Certificates > Proving who you are in the real world > The government (TTP) vouches for identity > If the certificate looks authentic, identifying marks, as picture, identify the person > Printed to make it hard to forge Name: James Bond Address: Somewhere Date of Birth: 1954 State of Fleming– ID certificate
  • 4. 4 Digital Certificates – Digital ID >A Digital document, containing the public key + identity information, digitally signed by a Certificate Authority (CA). >The public key replaces the photo For digitally verifying the user’s identity. >If the CA is trusted, a Challenge-Response protocol can be used for authentication. Name: James Bond email james@serv.com Public Key: 1f 0a 01 15 96 9a 5a 1c cc ab 1b f1 13 e8 Expiry Date: 3/5/00 CA Name: VeriSign CA Signature: 15 2f 36 1a
  • 5. 5 Real vs. Digital Certificates Name: James Bond Address: Somewhere Date of Birth: 1954 State of Fleming– ID certificate Name: James Bond email james@serv.com Public Key: 1f 0a 01 15 96 9a 5a 1c cc ab 1b f1 13 e8 Expiry Date: 3/5/00 CA Name: VeriSign CA Signature: 15 2f 36 1a > A means of proving identity: In Person / Digitally > The issuer vouches for James’ Identity: The government / a Certification Authority > If the certificate is found authentic, James can be identified by his: Looks (Picture) / Digital Signature (Based on Public Key) > Signed by: Government / the CA
  • 6. 6 Digital Signature > A digital signature is a small amount of data that was created using a Private Key > The user’s own Private Key is used to sign the data > The user’s Public Key is used to verify that the signature was really generated using the corresponding Private Key > Digital signatures are used to verify that a message really comes from the claimed sender … assuming only the sender holds the Private Key corresponding to the verifying Public Key)
  • 7. 7 Features of Digital Signatures > A digital signature should: > Be unforgeable (convince us that Alice signed – origin of data) > Authenticate (prevent anyone from changing the document after it has been signed) > Be hard to copy (remain secure even after seeing many signatures) > Important property – non-repudiation: > The owner of the signature cannot later deny that she signed (provides “proof of order”) > This is essential for electronic commerce and accountability > Digital signatures are messages that are hashed and then encrypted by the private key > The private key is essential for signing > To verify the signature, we must be sure of the Public Key owner’s identity
  • 8. 8 One-Way Hash Algorithms > Reduce a variable size block of data to a small – fixed size value called hash value > Operate one way – the original data cannot be derived from the hash value > The same data will always yield the same hash value > It is very hard to find different data blocks with the same hash value (in reasonable time). Therefore, in reality, different data blocks will yield different hash values. Hashing Algorithm Data 100110101 Hash Value Different Data 011010111 Different
  • 9. 9 Using Hash for Digital Signing Verification (Decryption) Hashing Algorithm Signing (Encryption) Hashing Algorithm 1101011011 Bob (Sender) Alice (Receiver) Plain Text Message + Signature Compare! Bob’s Private Key Bob’s Public Key 1101011011 1101011011
  • 10. 10 Whom Do We Trust? > When doing business, there has to be a body we trust to issue certificates > The trusted party that issues certificates to the identified entities is the Certification Authority (CA). > Policies ensure that every certificate applicant goes through a known procedure that verifies his/her identity > Policies enable clients of the CA to evaluate the amount of trust that can be given to a digital certificate > As a common Trusted Third Party, the CA enables two individuals to trust each other’s authenticity > By holding the CA’s Public Key (Root Certificate), users can validate the signature of certified users – by trusting the authenticity of their public keys.
  • 11. 11 Trusting the Root Certificate > Existing Root certificates can be view through the Content tab in IE Tools Internet Options
  • 12. 12 Internal CA Hierarchy > Root CA > Most trusted certificate > Best security > Least accessibility > Others > With distance from root > Decreasing security > Increasing accessibility Accessibility Security Root CA Intermediate CA1 Intermediate CA2 End Users
  • 14. 14 Industry Challenge: Moving from paper to digital documents improves efficiencies for invoice processing, storage, and retrieval while eliminating the cost and complexity of issuing and storing large amounts of paper based invoices. Security Challenge: To instill confidence in eDocuments security measures must be taken to establish trust as documents change hands, ensure document integrity, and prevent repudiation Role of HSMs: HSMs are the cornerstone for establishing this trust- safeguarding the cryptographic keys that will sign/verify the documents, providing security in the digital process, and ensuring trust across all parties. Benefits: Data is secured and stored to produce electronic evidence. Relieves administrative burden by reducing the risk of human error. Increases productivity for lower overall costs. Moving from Paper to Digital: eDocuments Why are HSMs needed?
  • 15. 15 Secure Digital Documents Why SafeNet HSMs are the right fit for eDocument Schemes SafeNet HSMs offer the robust security capabilities that ensure compliance with the European Directive on Invoicing, Brazil Notal Fiscal (NF-e), and other regulations. SafeNet HSMs are highly secure FIPS 140-2 and Common Criteria certified appliances capable of providing the high entropy key material required in eDocument schemes. Centralizing cryptographic keys and policy management on SafeNet HSMs allows businesses to significantly reduce the administration associated with managing digital signatures in a distributed, disparate fashion. With a secure , high performance, eDocument system in place, organizations are well equipped to integrate digital documents with other backend applications, such as procurement and enterprise resource planning, which can lead to further efficiency and accuracy gains.
  • 16. 16 Deployment Example The role of HSMs in secure eDocument processes
  • 17. 17 Deployment Example The role of HSMs in secure eDocument processes
  • 23. 23 Standard Document System SMTP eMail Server ERP System Receipt Printing Staff Automated Billing System Mass Printing Standard Mail
  • 24. 24 Smartcard Contact, Contactless and Physical Access Supported Solutions > Remote access (VPN) > Network access > Proximity access > Digital signing > Data security > Picture ID Badge Certifications* > FIPS 140-2 certified > Common Criteria certified
  • 25. 25 Digital Sign Policy System SMTP eMail Server Policy System Receipt Printing Users Automated Printing System Mass Printing Standard Mail Traditional Printing System
  • 26. 26 Luna SA HSM SafeNet Luna SA – Network Attached HSM FIPS 140-2 Level 3 and Common Criteria EAL4+ validated Trusted Keys in Hardware Segregated DNS Domain key storage (100 partitions) High Performance – 7,000 tps Key Storage capabilities – Scale 10,000 keys/per HSM
  • 27. 27 Automated Digital Sign Policy System SMTP eMail Server Policy System Receipt Printing Users Automated Printing System Mass Printing Standard Mail HSM Traditional Printing System
  • 29. 29 PDF Signing Diagram Policy System eMail Server HSM Unsigned PDF Signed PDF Signing Software / API Coding Online Customer
  • 31. 31 XML Signing Diagram 01 Policy System eMail Server HSM Unsigned XML Signed XML Signing Software / API Coding Online Customer
  • 32. 32 XML Signing Diagram 02 Policy System eMail Server HSM Signed PDF Signing Software / API Coding Revenue Department Database Online Customer
  • 35. 35 35