The document discusses MCA21, an initiative by the Ministry of Corporate Affairs in India to provide easy and secure access to MCA services. It aims to modernize MCA and facilitate business functions. The TCS solution for MCA21 includes an e-forms filing flow, certificate issuance and management using a PKI, which allows for digital signatures on filed documents. Key features of MCA21 include online company registration, annual filings, and public access to company records. It has processed millions of documents and digital certificates since launching in 2006.
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Venafi
In this on demand webinar, learn how to identify these risks and the steps to keep your enterprise in control over trust.
1. Learn the four certificate and key management threats to your business
2. Hear how criminals are ruining businesses with attacks on certificates
3. Get insights into the five simple steps to prevent your own disaster
Five Must Haves to Prevent Encryption DisastersVenafi
Simple errors, old and weak cryptography, and alarming, malicious attacks are turning digital certificates and encryption keys into an expressway to downtime, targeted attacks, failed compliance, and data breaches. Fortunately, there are simple steps you can take to make sure your organization doesn’t fall victim.
From online banking to the production line, thousands of certificates and keys in every enterprise are the difference between controlling success or failure.
In this live webinar, learn how enterprises are using NIST and industry best practices to develop an effective Enterprise Key and Certificate Management strategy.
Go to http://www.venafi.com/five-musts-ekcm/ to view the full On Demand Webinar.
Four Must Know Certificate and Key Management Threats That Can Bring Down You...Venafi
In this on demand webinar, learn how to identify these risks and the steps to keep your enterprise in control over trust.
1. Learn the four certificate and key management threats to your business
2. Hear how criminals are ruining businesses with attacks on certificates
3. Get insights into the five simple steps to prevent your own disaster
Five Must Haves to Prevent Encryption DisastersVenafi
Simple errors, old and weak cryptography, and alarming, malicious attacks are turning digital certificates and encryption keys into an expressway to downtime, targeted attacks, failed compliance, and data breaches. Fortunately, there are simple steps you can take to make sure your organization doesn’t fall victim.
From online banking to the production line, thousands of certificates and keys in every enterprise are the difference between controlling success or failure.
In this live webinar, learn how enterprises are using NIST and industry best practices to develop an effective Enterprise Key and Certificate Management strategy.
Go to http://www.venafi.com/five-musts-ekcm/ to view the full On Demand Webinar.
Perspective: Auditing norms for pki based applicationsInfosys Finacle
www.infosys.com/finacle
In general, the audit norms are similar, however,
PKI-based applications have certain constraints,
which need to be addressed during audit
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...IJNSA Journal
Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by certificate authorities (CAs), The process of getting certificates from a certificate authority(CA) for any SET participants involves a large number of procedures like sending request to issue a certificates, getting approval or
rejection of request and finally obtain the certificates, which is essentially time consuming as because these are associated with certificate management, including renew, revocation ,storage and distribution and the computational cost of certificate verification, also the chain of verification can be quite long, depending on the certificate hierarchy. So, the issues associated with certificate management are quite complex and costly.The present paper attempts the removal of the certificates using the ‘certificateless public key cryptography (CL-PKC)’ . The basic idea of CL-PKC is to generate a public/private key pair for a user by using a master key of a Key Generation Center (KGC) with a random secret value selected by the user. Hence, CL-PKC eliminates the use of certificates in traditional PKC and solves the key escrow problem in ID-PKC.The comparison with existing SET implementation is also addressed in the paper that shows the effectiveness of the proposal.
This POC is for ICB: International Consortium for Blockchain.
ICB accredits training providers (known as REPs – Registered Educational Partners) for blockchain-related courses.
The REPs can then train people on the accredited Courses and ICB issues certificates on successful course completion.
This POC deals with storing the details of the generated certificates on the blockchain and retrieving it upon request.
SEBI has mandated that Brokerages, DP's and Wealth Managers shall register all new accounts with KRA. CMC Ltd. has a ready solution for KRA. See it here.
This case study will examine an implementation strategy to record degrees and certificates onto the Blockchain for authenticity and verification purposes.
This Case Study discussed an implementation strategy for recording Degrees and Certificates on the Blockchain for authenticity and verification purposes.
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
Business Case and Capital Justification Presentation For
Application Performance Monitoring and Retrospective Network Analysis Implementation. *** This Presentation Has Been Sanitized of IP Information ***
Perspective: Auditing norms for pki based applicationsInfosys Finacle
www.infosys.com/finacle
In general, the audit norms are similar, however,
PKI-based applications have certain constraints,
which need to be addressed during audit
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...IJNSA Journal
Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by certificate authorities (CAs), The process of getting certificates from a certificate authority(CA) for any SET participants involves a large number of procedures like sending request to issue a certificates, getting approval or
rejection of request and finally obtain the certificates, which is essentially time consuming as because these are associated with certificate management, including renew, revocation ,storage and distribution and the computational cost of certificate verification, also the chain of verification can be quite long, depending on the certificate hierarchy. So, the issues associated with certificate management are quite complex and costly.The present paper attempts the removal of the certificates using the ‘certificateless public key cryptography (CL-PKC)’ . The basic idea of CL-PKC is to generate a public/private key pair for a user by using a master key of a Key Generation Center (KGC) with a random secret value selected by the user. Hence, CL-PKC eliminates the use of certificates in traditional PKC and solves the key escrow problem in ID-PKC.The comparison with existing SET implementation is also addressed in the paper that shows the effectiveness of the proposal.
This POC is for ICB: International Consortium for Blockchain.
ICB accredits training providers (known as REPs – Registered Educational Partners) for blockchain-related courses.
The REPs can then train people on the accredited Courses and ICB issues certificates on successful course completion.
This POC deals with storing the details of the generated certificates on the blockchain and retrieving it upon request.
SEBI has mandated that Brokerages, DP's and Wealth Managers shall register all new accounts with KRA. CMC Ltd. has a ready solution for KRA. See it here.
This case study will examine an implementation strategy to record degrees and certificates onto the Blockchain for authenticity and verification purposes.
This Case Study discussed an implementation strategy for recording Degrees and Certificates on the Blockchain for authenticity and verification purposes.
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
Business Case and Capital Justification Presentation For
Application Performance Monitoring and Retrospective Network Analysis Implementation. *** This Presentation Has Been Sanitized of IP Information ***
Similar to Pki enabling applications and mca implementation in tcs (20)
3. About MCA21
Initiative
• Initiated by Ministry of Corporate Affairs, Government of India
• Provides easy and secure access to MCA services for business users and
citizens
• Aims at repositioning MCA as an organization capable of fulfilling the
aspirations of its stakeholders in the 21st century
MCA Vision
“To be a leader and partner in initiatives for Corporate
Reforms, Good Governance and Enlightened Regulation, with
a view to promote and facilitate effective corporate functioning
and investor protection.”
The MCA21 application builds on the Government's vision to introduce a service-
oriented approach in the design and delivery of Government services and
establish a healthy business eco-system
-3-
4. About MCA21
MCA21 Goals – Stakeholders’ Perspective
Business Register a company and file statutory documents quickly and easily
Public Easy access to relevant records and prompt redressal of grievances
Professionals Offer efficient services to their client companies
Financial Institutions Easily find charges registration and verification
Ensure proactive and effective compliance of relevant laws and
MCA Employees
corporate governance
-4-
5. About MCA21
MCA21 Services
Registration and incorporation of new companies
Filing of Annual Returns and Balance Sheets
Filing of forms for change of names/address/Director’s details
Registration and verification of charges
Inspection of documents
Applications for various statutory services from MCA
-5-
6. About MCA21
MCA21 Key Milestones
National Award for e-Governance –2007-08 in Gold
2007-08 category for excellence in government Process Re-engineering
Government mandates electronic filing by
16 Sep 2006
th companies with the use of digital signatures.
Nation-wide rollout completed across
04 Sep 2006
th all 20 Registrars of Companies.
Hon’ble Prime Minister of India
19th Mar 2006 launched the second Pilot at Delhi.
Pilot launch of MCA21 e-Gov
18 Feb 2006
th project at Coimbatore
-6-
7. About MCA21
MCA21 Key Statistics
2 million hits on an average per day
6.5 million hits on 29th November 06
42.92 lakh documents submitted till 31st March 08
80% documents were filed by companies and professionals using MCA portal
without any help
4.72 lakh company records viewed as on 31st March 08 using the public documents
facility
7.91 lakh Direct Identification Numbers (DINs) issued as on 31st Mar 08
110006 companies registered online as on 31st Mar 08
-7-
10. TCS Solution for MCA21
Solution Components
The TCS solution consisted of:
– Certificate Issuance and Management
Certificate issuance and management module is responsible for the issuance of
Indian IT Act compliant digital certificates. MCA is the Registration Authority
Office (RAO) that accepts the end users requests and verifies them before
forwarding them to TCS CA for certificate generation. The RAO also handles
the revocation and suspension requests.
– PKI Enabling of Application
- 10 -
11. TCS Solution for MCA21
Certificate Issuance
Certificate
Certificate
Details
Details
1. The end user 2. The RA
1. The end user 2. The RA
requests for aa Office verifies
requests for Office verifies
Digital Certificate the certificate
Digital Certificate the certificate
request
request
End User
3. The certificate
3. The certificate
RA Office is generated at
CA is generated at
CA Secure
CA Secure
Facility
Facility
5. The end user
5. The end user
downloads and 4. The
downloads and 4. The
installs the Digital certificate is
installs the Digital certificate is
Certificate published in
Certificate published in
the repository CA Repository
the repository
- 11 -
12. TCS Solution for MCA21
Certificate Management
Request Initiated by RA
Office
3. The RA Administrator
3. The RA Administrator
initiates and processes
initiates and processes
the request for
the request for
certificate revocation / /
certificate revocation
suspension / / activation
Request Initiated by End User suspension activation
2. The RA
2. The RA
Administrator
Administrator
verifies the
verifies the
request
request
End User 4. The
4. The
certificate is
RA Office certificate is
revoked at CA
1. The end user CA revoked at CA
1. The end user Secure Facility
requests for aa Secure Facility
requests for
Digital Certificate
Digital Certificate
revocation/
revocation/
suspension/
suspension/
activation
activation
5. CRL
5. CRL
published in the
published in the
repository
repository
CA Repository
- 12 -
13. TCS Solution for MCA21
PKI Enabling
User Registration
Secure login to MCA21 Portal
Role check for companies
Back office approval (Batch signing of documents)
Access public documents
Digital certificate expiry check
- 13 -
14. TCS Solution for MCA21
PKI Enabling - User Registration
Business users to register digital certificates
End User Server
Internet
Registration
• The TCS PKI solution displays Store user digital certificate
User
a list of available digital fields in the MCA21 database
certificates
• The user selects a digital
certificate for registration
• The TCS PKI solution parses
the digital certificate to retrieve
digital certificate fields and
transmits them to the server
- 14 -
15. TCS Solution for MCA21
PKI Enabling - Secure Login
MCA21 employees, directors and professionals logon to the MCA21 portal
using digital certificates
End User Server
Internet
Secure Login
• The TCS PKI solution The TCS PKI solution
displays a list of available verifies the signature and
digital certificates provides access to the
MCA21 portal
• The user selects a digital
certificate for login
• The TCS PKI solution is used
to present signed data for
authentication
- 15 -
16. TCS Solution for MCA21
PKI Enabling - Role Check for Companies
MCA21 business users designated as directors, manager/secretary and practicing
professionals need to register their digital certificate against their role
End User Server
Internet
for Companies
Role Check
• Users click on their role The TCS PKI solution verifies
the signature and maps the
• The TCS PKI solution displays a certificate against the
list of available digital certificates selected role
• The user selects a digital
certificate for registration
• The TCS PKI solution is used to
present signed data for
authentication
- 16 -
17. TCS Solution for MCA21
PKI Enabling - Back Office Approval
MCA21 employees digitally sign eForms as proof of having processed/
approved a request in recognition of delivery of service
MCA21 Official Server
Back Office
Approval
• The TCS PKI solution is used
to sign submitted eForms/
documents in a batch using
MCA employee digital
certificates
- 17 -
18. TCS Solution for MCA21
PKI Enabling - Access to Public Documents
MCA21 provides access to general public for the documents submitted by
companies
End User Server
Internet
Public Documents
Access to
• Employee requests for The TCS PKI solution is used to
download of a document parse digital signatures to extract
documents requested for download
- 18 -
19. TCS Solution for MCA21
PKI Enabling - Digital Certificate Expiry Check
Certificate expiry check is performed during registration and login.
End User Server
Internet
Public Documents
Access to
• The TCS PKI solution The TCS PKI solution
displays a list of available checks if the certificate is
digital certificates valid
• The user selects a digital
certificate for
registration/login
• The TCS PKI solution is
used to present signed
data for authentication
- 19 -
20. MCA21 Benefits
On‐line incorporation of companies
Simplified and easy mode of filing of Forms/ Returns
Anywhere, anytime registration and verification of charges
Corporate‐centric approach
Centralized database repository of corporate companies operating in India
Enhanced service level fulfillment and customer relationship building
Total transparency through e-Governance
Timely redressal of investor grievances
- 20 -