SlideShare a Scribd company logo
Securing eHealth, eGovernment and eBanking
with Java
JCON2020#
www.jcon.one
Werner Keil
CATMedia
Our Partners 2020:
Thodoris Bais
ABN Amro & Utrecht JUG
Werner Keil Thodoris Bais
Jakarta EE Specification Committee Member Expert Group Member JSR-385
Let’s meet
@thodorisbais@wernerkeil
@thodorisbais@wernerkeil
ABN Amro Bank
Financial sector
Amsterdam
Agile organization
20,000
3000+
400+
Total number of employeesEnterprise bank
Headquarters Development Teams
DevOps / Hybrid cloud Applications
Agenda
1. eHealth and eGovernment
2. Signatures and Certificates
3. eBanking
4. DSS Framework
5. Demo
6. Links / Q&A
eHealth refers to the use of
information and communications
technologies in healthcare.
https://www.who.int/ehealth/en/
eGovernment is the opening up
and adaptation of the public
sector through information and
communication technologies.
ExternalInternal
eGovernment in 🇩🇪
Long distance communication Health Data Patient Monitoring
eHealth in 🇩🇪
eGovernment in 🇳🇱
80%
Access to medical records
75%
Health monitoring
eHealth in 🇳🇱
Online contact
with care provider
eHealth in 🇳🇱 – How to achieve these
goals
Benefits of eHealth
Insight into own health
Time saving
Requirements for Secure
Transmission
Integrity Identity Authenticity
Authenticity of Author and Data
• Assignment of data to the signer
• Protection against denial by signatory
• Protection of data against manipulation
• On the transmission path
• Through the receiver
Risks & Solutions
Electronic Signatures
Functionality
The electronic signature is a
cryptographic method that
uses two asymmetric keys
• Private key
• Public key
Signature Process
Signature Types
The signature law distinguishes three (or four) types
of signatures:
• Simple Electronic Signature (SES)
• Advanced Electronic Signature (AdES)
• Qualified Electronic Signature (QES)
• Qualified Electronic Signature with Provider Accreditation
Signature Types
Advanced Electronic Signature
Electronic signatures, where:
• The owner can be uniquely identified and assigned to the signature
• The signature is generated by means which owner can keep under
their sole control
• It is capable of identifying if accompanying data has changed after
the message was signed
• The signature can be invalidated in the event of such change
Scope of Application
An advanced electronic signature holder can also be a company,
service, app, etc.
The advanced electronic signature can therefore be used to sign
documents if there are no legal formalities (personal certificates)
With the advanced electronic signature, mass signatures are
possible, for example to ensure the integrity of documents in the area
of electronic invoicing or archiving (functional certificates)
Qualified Electronic Signature
An advanced electronic signature based on a secure signature
creation device and a qualified certificate valid at the time of creation.
Qualified Certificates
• Serial Number
• Reference to Qualified Certificate
• Name of the owner (natural person)
• Signature verification
• Period of validity
• Certification Service
• Usage restrictions
Qualified Electronic Signature
with Accreditation
Provision of the PKI by a trust center that has undergone the
voluntary accreditation process.
Accreditation as a quality label provides proof of comprehensively
tested safety.
An accredited Qualified Trust Service Provider (QTSP) manages the
signature creation.
Certificates
Certificates
The assignment of the electronic signature to the owner is carried out
by means of certificates
A certificate is an electronic document linking the public signature
verification key to the name of the holder (natural or legal person)
The most common format for public key certificates is X.509.
Signature Formats
There are four main types of signatures:
• XAdES (XML Document)
• CAdES (Common binaries of different kinds)
• PAdES (PDF Document)
• Associated Signature Containers (ASiC)
Signature Packaging
Depending on the signature format, different packaging of the
signature and the document are possible:
• Enveloped
• Enveloping
• Detached
• Internally Detached
Signature Creation and Validation
eSENS Document Flow
eBanking with PSD2
eIDAS Certificate for PSD2
DSS Framework
DSS Framework
DSS (Digital Signature Services) is an open-source software library
for electronic signature creation and validation. DSS supports the
creation and verification of interoperable and secure electronic
signatures in line with European legislation.
Three main features can be distinguished within the framework:
• Creation of a Digital Signature
• Extension of a Digital Signature
• Validation of a Digital Signature
DSS Framework – Features
• Formats of the signed documents: XML, PDF, DOC, TXT, ZIP,…​
• Packaging structures: enveloping, enveloped, detached and
internally-detached
• Forms signatures: XAdES, CAdES, PAdES and ASiC-S/ASiC-E
• Profiles associated to each form of the digital signature
• Trust management
• Revocation data handling (OCSP and CRL sources)
• Certificate chain building
• Signature validation and validation policy
• Validation of the signing certificate
PDF Insecurity
https://www.pdf-insecurity.org/index.html
PDF Insecurity
Demo Time
@thodorisbais@wernerkeil
Links
CEF Digital Home:
https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/eSignature
eGov EU Twitter Account: @eGov_EU
CEF DSS:
https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/DSS
DSS Framework on GitHub: https://github.com/esig/dss
Bouncy Castle for Java:
https://www.bouncycastle.org/java.html
Apache Sanctuario: https://santuario.apache.org/
Apache PDFBox: https://pdfbox.apache.org/
Thank You !
JCON2020#
www.jcon.one
Our Partners 2020:
@wernerkeil @thodorisbais

More Related Content

What's hot

BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
Gareth Niblett
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accurately
David Kelts, CIPT
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
eMudhra dsc
 
Electronic credential authentication_standard
Electronic credential authentication_standardElectronic credential authentication_standard
Electronic credential authentication_standard
Hai Nguyen
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OpenIDFoundation
 
Authenticated Document/Data Exchange
Authenticated Document/Data ExchangeAuthenticated Document/Data Exchange
Authenticated Document/Data Exchange
Nathaniel Palmer
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
CyberBahn Federal Solutions
 
Eurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulationEurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulation
Stefane Mouille
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
Vasiliy Suvorov
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
sorenpeter
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
Jean-François LOMBARDO
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
Sanjeev Raman
 
CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...
CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...
CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...
Consorci Administració Oberta de Catalunya
 
Blocktick as Product
Blocktick as ProductBlocktick as Product
Blocktick as Product
Celine George
 
2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summit
CloudIDSummit
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Evernym
 
Blockchain private permissioned
Blockchain private permissionedBlockchain private permissioned
Blockchain private permissioned
Jan Biets [jan_biets@hotmail.com]
 
Electronic signature with blockchain
Electronic signature with blockchainElectronic signature with blockchain
Electronic signature with blockchain
Stefano Tempesta
 
Zhendong Ma: A Structured Analysis of Digital Identity for e-Government Services
Zhendong Ma: A Structured Analysis of Digital Identity for e-Government ServicesZhendong Ma: A Structured Analysis of Digital Identity for e-Government Services
Zhendong Ma: A Structured Analysis of Digital Identity for e-Government Services
Danube University Krems, Centre for E-Governance
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
Oliver Pfaff
 

What's hot (20)

BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accurately
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
 
Electronic credential authentication_standard
Electronic credential authentication_standardElectronic credential authentication_standard
Electronic credential authentication_standard
 
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...
 
Authenticated Document/Data Exchange
Authenticated Document/Data ExchangeAuthenticated Document/Data Exchange
Authenticated Document/Data Exchange
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Eurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulationEurosmart presentation on the eidas regulation
Eurosmart presentation on the eidas regulation
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102CPA - Introduction to Digital Identity - rev20171102
CPA - Introduction to Digital Identity - rev20171102
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...
CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...
CGDL2018 - Sessió: "Hacia una nueva era de la identidad digital. El uso de bl...
 
Blocktick as Product
Blocktick as ProductBlocktick as Product
Blocktick as Product
 
2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summit
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
 
Blockchain private permissioned
Blockchain private permissionedBlockchain private permissioned
Blockchain private permissioned
 
Electronic signature with blockchain
Electronic signature with blockchainElectronic signature with blockchain
Electronic signature with blockchain
 
Zhendong Ma: A Structured Analysis of Digital Identity for e-Government Services
Zhendong Ma: A Structured Analysis of Digital Identity for e-Government ServicesZhendong Ma: A Structured Analysis of Digital Identity for e-Government Services
Zhendong Ma: A Structured Analysis of Digital Identity for e-Government Services
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 

Similar to Securing eHealth, eGovernment and eBanking with Java - JCON Conference

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
SafeNet
 
How do you secure an electronic signature?
How do you secure an electronic signature?How do you secure an electronic signature?
How do you secure an electronic signature?
XeniT Solutions nv
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
Lucas Gritziotis
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
itnewsafrica
 
Proof of existence Market Research
Proof of existence Market ResearchProof of existence Market Research
Proof of existence Market Research
Tetsuyuki Oishi
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
Maganathin Veeraragaloo
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
Support for Improvement in Governance and Management SIGMA
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature Law
DocuSign
 
Semlex Leaflets 2017
Semlex Leaflets 2017 Semlex Leaflets 2017
Semlex Leaflets 2017
Semlex Europe
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
Entrust Datacard
 
Securing eHealth and eGovernment with Java - Java2Days 2019
Securing eHealth and eGovernment with Java - Java2Days 2019Securing eHealth and eGovernment with Java - Java2Days 2019
Securing eHealth and eGovernment with Java - Java2Days 2019
Thodoris Bais
 
Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
Mohammad Yasar
 
Session 1. e-ID_esign
Session 1. e-ID_esignSession 1. e-ID_esign
Session 1. e-ID_esign
e-SENS project
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
Ubisecure
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
rhassan84
 

Similar to Securing eHealth, eGovernment and eBanking with Java - JCON Conference (20)

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
How do you secure an electronic signature?
How do you secure an electronic signature?How do you secure an electronic signature?
How do you secure an electronic signature?
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Proof of existence Market Research
Proof of existence Market ResearchProof of existence Market Research
Proof of existence Market Research
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature Law
 
Semlex Leaflets 2017
Semlex Leaflets 2017 Semlex Leaflets 2017
Semlex Leaflets 2017
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Securing eHealth and eGovernment with Java - Java2Days 2019
Securing eHealth and eGovernment with Java - Java2Days 2019Securing eHealth and eGovernment with Java - Java2Days 2019
Securing eHealth and eGovernment with Java - Java2Days 2019
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Session 1. e-ID_esign
Session 1. e-ID_esignSession 1. e-ID_esign
Session 1. e-ID_esign
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 

More from Thodoris Bais

EclipseCon 2021 NoSQL Endgame
EclipseCon 2021 NoSQL EndgameEclipseCon 2021 NoSQL Endgame
EclipseCon 2021 NoSQL Endgame
Thodoris Bais
 
You Graduated Now What ECE UoWM 2021
You Graduated Now What ECE UoWM 2021You Graduated Now What ECE UoWM 2021
You Graduated Now What ECE UoWM 2021
Thodoris Bais
 
NoSQL Endgame LWJUG 2021
NoSQL Endgame LWJUG 2021NoSQL Endgame LWJUG 2021
NoSQL Endgame LWJUG 2021
Thodoris Bais
 
Be the Leader of Your Own Career Global Summit for Java Devs 21
Be the Leader of Your Own Career Global Summit for Java Devs 21Be the Leader of Your Own Career Global Summit for Java Devs 21
Be the Leader of Your Own Career Global Summit for Java Devs 21
Thodoris Bais
 
How to grow an amazing community - JavaLand 2021
How to grow an amazing community - JavaLand 2021How to grow an amazing community - JavaLand 2021
How to grow an amazing community - JavaLand 2021
Thodoris Bais
 
NoSQL Endgame DevoxxUA Conference 2020
NoSQL Endgame DevoxxUA Conference 2020NoSQL Endgame DevoxxUA Conference 2020
NoSQL Endgame DevoxxUA Conference 2020
Thodoris Bais
 
Be the Leader of Your Own Career JCON Conference 2020
Be the Leader of Your Own Career JCON Conference 2020Be the Leader of Your Own Career JCON Conference 2020
Be the Leader of Your Own Career JCON Conference 2020
Thodoris Bais
 
NoSQL Endgame JCON Conference 2020
NoSQL Endgame JCON Conference 2020NoSQL Endgame JCON Conference 2020
NoSQL Endgame JCON Conference 2020
Thodoris Bais
 
NoSQL Endgame Percona Live Online 2020
NoSQL Endgame Percona Live Online 2020NoSQL Endgame Percona Live Online 2020
NoSQL Endgame Percona Live Online 2020
Thodoris Bais
 
Utrecht JUG meetup September 2020
Utrecht JUG meetup September 2020Utrecht JUG meetup September 2020
Utrecht JUG meetup September 2020
Thodoris Bais
 
How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020
How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020
How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020
Thodoris Bais
 
Developer Career: Own it - SouJava April 2020
Developer Career: Own it - SouJava April 2020Developer Career: Own it - SouJava April 2020
Developer Career: Own it - SouJava April 2020
Thodoris Bais
 
Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020
Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020
Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020
Thodoris Bais
 
How to pitch an innovative idea in a corporate environment
How to pitch an innovative idea in a corporate environmentHow to pitch an innovative idea in a corporate environment
How to pitch an innovative idea in a corporate environment
Thodoris Bais
 
Utrecht JUG meetup February 2020
Utrecht JUG meetup February 2020Utrecht JUG meetup February 2020
Utrecht JUG meetup February 2020
Thodoris Bais
 
Developer Career: Own it - Adorsys 2020
Developer Career: Own it - Adorsys 2020Developer Career: Own it - Adorsys 2020
Developer Career: Own it - Adorsys 2020
Thodoris Bais
 
How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020
How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020
How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020
Thodoris Bais
 
Utrecht JUG Meetup January 2020
Utrecht JUG Meetup January 2020Utrecht JUG Meetup January 2020
Utrecht JUG Meetup January 2020
Thodoris Bais
 
Developer Career: Own it - Java2Days 2019
Developer Career: Own it - Java2Days 2019Developer Career: Own it - Java2Days 2019
Developer Career: Own it - Java2Days 2019
Thodoris Bais
 
Utrecht JUG meetup December 2019 Speaker Incubator
Utrecht JUG meetup December 2019 Speaker IncubatorUtrecht JUG meetup December 2019 Speaker Incubator
Utrecht JUG meetup December 2019 Speaker Incubator
Thodoris Bais
 

More from Thodoris Bais (20)

EclipseCon 2021 NoSQL Endgame
EclipseCon 2021 NoSQL EndgameEclipseCon 2021 NoSQL Endgame
EclipseCon 2021 NoSQL Endgame
 
You Graduated Now What ECE UoWM 2021
You Graduated Now What ECE UoWM 2021You Graduated Now What ECE UoWM 2021
You Graduated Now What ECE UoWM 2021
 
NoSQL Endgame LWJUG 2021
NoSQL Endgame LWJUG 2021NoSQL Endgame LWJUG 2021
NoSQL Endgame LWJUG 2021
 
Be the Leader of Your Own Career Global Summit for Java Devs 21
Be the Leader of Your Own Career Global Summit for Java Devs 21Be the Leader of Your Own Career Global Summit for Java Devs 21
Be the Leader of Your Own Career Global Summit for Java Devs 21
 
How to grow an amazing community - JavaLand 2021
How to grow an amazing community - JavaLand 2021How to grow an amazing community - JavaLand 2021
How to grow an amazing community - JavaLand 2021
 
NoSQL Endgame DevoxxUA Conference 2020
NoSQL Endgame DevoxxUA Conference 2020NoSQL Endgame DevoxxUA Conference 2020
NoSQL Endgame DevoxxUA Conference 2020
 
Be the Leader of Your Own Career JCON Conference 2020
Be the Leader of Your Own Career JCON Conference 2020Be the Leader of Your Own Career JCON Conference 2020
Be the Leader of Your Own Career JCON Conference 2020
 
NoSQL Endgame JCON Conference 2020
NoSQL Endgame JCON Conference 2020NoSQL Endgame JCON Conference 2020
NoSQL Endgame JCON Conference 2020
 
NoSQL Endgame Percona Live Online 2020
NoSQL Endgame Percona Live Online 2020NoSQL Endgame Percona Live Online 2020
NoSQL Endgame Percona Live Online 2020
 
Utrecht JUG meetup September 2020
Utrecht JUG meetup September 2020Utrecht JUG meetup September 2020
Utrecht JUG meetup September 2020
 
How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020
How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020
How JSR 385 could have Saved the Mars Climate Orbiter Java Global Summit 2020
 
Developer Career: Own it - SouJava April 2020
Developer Career: Own it - SouJava April 2020Developer Career: Own it - SouJava April 2020
Developer Career: Own it - SouJava April 2020
 
Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020
Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020
Securing eHealth and eGovernment with Java - AllTheTalksOnline 2020
 
How to pitch an innovative idea in a corporate environment
How to pitch an innovative idea in a corporate environmentHow to pitch an innovative idea in a corporate environment
How to pitch an innovative idea in a corporate environment
 
Utrecht JUG meetup February 2020
Utrecht JUG meetup February 2020Utrecht JUG meetup February 2020
Utrecht JUG meetup February 2020
 
Developer Career: Own it - Adorsys 2020
Developer Career: Own it - Adorsys 2020Developer Career: Own it - Adorsys 2020
Developer Career: Own it - Adorsys 2020
 
How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020
How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020
How JSR 385 could have Saved the Mars Climate Orbiter Adorsys 2020
 
Utrecht JUG Meetup January 2020
Utrecht JUG Meetup January 2020Utrecht JUG Meetup January 2020
Utrecht JUG Meetup January 2020
 
Developer Career: Own it - Java2Days 2019
Developer Career: Own it - Java2Days 2019Developer Career: Own it - Java2Days 2019
Developer Career: Own it - Java2Days 2019
 
Utrecht JUG meetup December 2019 Speaker Incubator
Utrecht JUG meetup December 2019 Speaker IncubatorUtrecht JUG meetup December 2019 Speaker Incubator
Utrecht JUG meetup December 2019 Speaker Incubator
 

Recently uploaded

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

Securing eHealth, eGovernment and eBanking with Java - JCON Conference

  • 1. Securing eHealth, eGovernment and eBanking with Java JCON2020# www.jcon.one Werner Keil CATMedia Our Partners 2020: Thodoris Bais ABN Amro & Utrecht JUG
  • 2. Werner Keil Thodoris Bais Jakarta EE Specification Committee Member Expert Group Member JSR-385 Let’s meet @thodorisbais@wernerkeil
  • 3. @thodorisbais@wernerkeil ABN Amro Bank Financial sector Amsterdam Agile organization 20,000 3000+ 400+ Total number of employeesEnterprise bank Headquarters Development Teams DevOps / Hybrid cloud Applications
  • 4. Agenda 1. eHealth and eGovernment 2. Signatures and Certificates 3. eBanking 4. DSS Framework 5. Demo 6. Links / Q&A
  • 5. eHealth refers to the use of information and communications technologies in healthcare. https://www.who.int/ehealth/en/
  • 6. eGovernment is the opening up and adaptation of the public sector through information and communication technologies.
  • 8. Long distance communication Health Data Patient Monitoring eHealth in 🇩🇪
  • 10. 80% Access to medical records 75% Health monitoring eHealth in 🇳🇱 Online contact with care provider
  • 11. eHealth in 🇳🇱 – How to achieve these goals
  • 12. Benefits of eHealth Insight into own health Time saving
  • 14. Authenticity of Author and Data • Assignment of data to the signer • Protection against denial by signatory • Protection of data against manipulation • On the transmission path • Through the receiver
  • 17. Functionality The electronic signature is a cryptographic method that uses two asymmetric keys • Private key • Public key
  • 19. Signature Types The signature law distinguishes three (or four) types of signatures: • Simple Electronic Signature (SES) • Advanced Electronic Signature (AdES) • Qualified Electronic Signature (QES) • Qualified Electronic Signature with Provider Accreditation
  • 21. Advanced Electronic Signature Electronic signatures, where: • The owner can be uniquely identified and assigned to the signature • The signature is generated by means which owner can keep under their sole control • It is capable of identifying if accompanying data has changed after the message was signed • The signature can be invalidated in the event of such change
  • 22. Scope of Application An advanced electronic signature holder can also be a company, service, app, etc. The advanced electronic signature can therefore be used to sign documents if there are no legal formalities (personal certificates) With the advanced electronic signature, mass signatures are possible, for example to ensure the integrity of documents in the area of electronic invoicing or archiving (functional certificates)
  • 23. Qualified Electronic Signature An advanced electronic signature based on a secure signature creation device and a qualified certificate valid at the time of creation. Qualified Certificates • Serial Number • Reference to Qualified Certificate • Name of the owner (natural person) • Signature verification • Period of validity • Certification Service • Usage restrictions
  • 24. Qualified Electronic Signature with Accreditation Provision of the PKI by a trust center that has undergone the voluntary accreditation process. Accreditation as a quality label provides proof of comprehensively tested safety. An accredited Qualified Trust Service Provider (QTSP) manages the signature creation.
  • 26. Certificates The assignment of the electronic signature to the owner is carried out by means of certificates A certificate is an electronic document linking the public signature verification key to the name of the holder (natural or legal person) The most common format for public key certificates is X.509.
  • 27. Signature Formats There are four main types of signatures: • XAdES (XML Document) • CAdES (Common binaries of different kinds) • PAdES (PDF Document) • Associated Signature Containers (ASiC)
  • 28. Signature Packaging Depending on the signature format, different packaging of the signature and the document are possible: • Enveloped • Enveloping • Detached • Internally Detached
  • 34. DSS Framework DSS (Digital Signature Services) is an open-source software library for electronic signature creation and validation. DSS supports the creation and verification of interoperable and secure electronic signatures in line with European legislation. Three main features can be distinguished within the framework: • Creation of a Digital Signature • Extension of a Digital Signature • Validation of a Digital Signature
  • 35. DSS Framework – Features • Formats of the signed documents: XML, PDF, DOC, TXT, ZIP,…​ • Packaging structures: enveloping, enveloped, detached and internally-detached • Forms signatures: XAdES, CAdES, PAdES and ASiC-S/ASiC-E • Profiles associated to each form of the digital signature • Trust management • Revocation data handling (OCSP and CRL sources) • Certificate chain building • Signature validation and validation policy • Validation of the signing certificate
  • 39. Links CEF Digital Home: https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/eSignature eGov EU Twitter Account: @eGov_EU CEF DSS: https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/DSS DSS Framework on GitHub: https://github.com/esig/dss Bouncy Castle for Java: https://www.bouncycastle.org/java.html Apache Sanctuario: https://santuario.apache.org/ Apache PDFBox: https://pdfbox.apache.org/
  • 40. Thank You ! JCON2020# www.jcon.one Our Partners 2020: @wernerkeil @thodorisbais

Editor's Notes

  1. Internal - Use of IT within the public sector without any contact with the citizen -> electronic medical records, exchange between public authorities, healthcare providers, pharmacies, etc. External - Web site and services for citizens, patients, customers, companies, etc.
  2. Currently, Germany is still at an early stage of the application of e-health. There are, however, already some advantages and possibilities. For example for: Long distance communication, regardless of location. Especially in rural areas, or where there is a shortage of doctors Computer-based procedures for the collection, transmission and evaluation of health data. The monitoring of patients, for example, the chronically ill, or voluntary self-monitoring (Quantified Self)
  3. eIDAS (ιάιντας) : accessing Dutch government services online The introduction of the Electronic Identification and Trust Services Regulation (eIDAS) means EU citizens from other member states can access Dutch government services online. What government services can I access in the Netherlands? You can use your login details for any approved European electronic identification scheme to access all the same services as Dutch people can using their DigiD. If, for example, you are a German national working in the Netherlands, you can log in using your ‘Neuer Personalausweis’ to: see how much pension you have built up through the Social Insurance Bank (SVB); submit your tax return to the Tax and Customs Administration; check your pension payments to your pension provider; object to the assessment of the value of your property under the Valuation of Immovable Property Act (WOZ); BSN ?
  4. The government is encouraging the healthcare sector to expand telehealth (eHealth) services. Goals set by the Dutch government: Access to medical records At least 80% of chronically ill people should have access to their own medical records by 2019, and at least 40% of other members of the population. Health monitoring By 2019 75% of chronically ill people and vulnerable elderly people should be able to monitor certain aspects of their own health and share the data with their health provider (e.g. blood pressure and cholesterol levels) Online contact with care provider People receiving care and support at home should be able to communicate with their care provider 24 hours a day via a screen, if they wish.
  5. Support for innovators via online platform Healthcare innovators willing to make a new digital application can go to zorgvoorinnoveren.nl - support to help them develop their idea swiftly and effectively into a working application. The site also has tips on getting funding. Making digital data sharing easier The government is consulting with healthcare administrators on standards that should facilitate digital data sharing. They are also talking to suppliers of IT systems. Sharing eHealth knowhow The government is bringing healthcare innovators and other parties together. It has established a startup network, for example, which includes healthcare providers, patients and lawyers. The network allows them to share knowledge and help startups and innovations advance to the next stage. Personal digital healthcare environment Some healthcare providers and IT suppliers already offer patients the opportunity to draw up and manage a personal health record (PHR). But safely combining and sharing personal health information is a complex matter, and is currently possible to only a limited extent. Various parties in the healthcare sector are therefore collaborating on a programme to give people more control over their own health.
  6. Time saving Patients can schedule their own appointment with their care provider online. No need to leave their home if they can arrange an online consultation (e.g. video link) Insight into own health A personal digital healthcare environment gives people more insight into their health. If they wish, they can share all or part of their data with a healthcare provider, so that they do not have to repeatedly relate their entire medical history. This allows the healthcare provider to work more effectively, determine the right treatment more quickly, and avoid mistakes. Patients gain more control over their own health thanks to a greater understanding of their health situation. Lower administrative burden Doctors have less paperwork and can share information securely and easily with colleagues. Not all healthcare providers currently offer telehealth. But healthcare providers and patients are becoming more aware of the benefits. Many doctors now offer patients the opportunity to schedule appointments online. Around 46% of patients would like to have online access to their medical records (source: eHealth Monitor 2015), but this can only be done if there are good safeguards for privacy.
  7. Integrity Messages should not be able to be falsified unnoticed Identity A message should be clearly assigned to the sender Authenticity The identity of the sender should be verifiable Confidentiality Messages should not be read by unauthorized persons
  8. E-communication entails risks Who is my counterpart? Who is reading? Has anyone changed something? Solutions: E-Signature & Encryption Unauthorised third parties cannot read an encrypted message Electronically signed documents can not be changed unnoticed, neither during transmission nor through the receiver -Sender can not deny text (e.g., binding offer)
  9. The private key to be kept secret is used to encrypt the hash value of the document (= "Compressed text consisting of a sequence of binary values) The public key can only be used for decryption and matches only one private key. It can be publicly retrieved and is often sent with the message
  10. The private key to be kept secret is used to encrypt the hash value of the document (= "Compressed text consisting of a sequence of binary values) The public key can only be used for decryption and matches only one private key. It can be publicly retrieved and is often sent with the message
  11. e-SENS (Electronic Simple European Networked Services)
  12. PSU = Payment Service User TPP = Third Party Provider PISP = Payment Initiation Service Provider AISP = Account Information Service Provider PIISP = Payment Instrument Issuer Service Provider ASPSP = Account Servicing Payment Service Providers XS2A = Access 2 Accounts
  13. NCA = National Competent Authority CSR = Certificate Signing Request QTSP = Qualified Trust Service Provider
  14. Add the 4 versions of signature validation