Supports the development & implementation of a IPPC Global ePhyto Hub to: Utilize modern Cloud technology. Ensure there is a secure folder for each countries’

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Using Digital Credentials On The World-Wide Web M. Winslett.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Cryptography 101 Frank Hecker
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Wireless and Security CSCI 5857: Encoding and Encryption.
Secure Electronic Transaction (SET)
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
ACM 511 Introduction to Computer Networks. Computer Networks.
Second Generation Electronic Filing Specifications Legal XML Court Filing Committee April 26, 2004.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
E-Government “Get your Level 2 eAuthentication!” Go to:
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
An electronic phytosanitary certificate. Is NOT a copy of a printed phytosanitary certificate that is ed. Is a secured data set using XML for transmission.
United States Department of Agriculture Animal and Plant Health Inspection Service Plant Protection and Quarantine Electronic Exchange and the Cloud IPPC.
1 Overview of the Hub Concept & Prototype for Secure Method of Information Exchange (SMIE) April 2013 Prepared by NZ & USA.
The International Plant Protection Convention IPPC Secretariat, November 2015 Electronic Phytosanitary Certification, ePhyto.
Postage Statement Wizard Mail.dat Web Services Presented by: (insert name here) The 1, 2, 3 of Electronic Postage Documentation.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Electronic Phytosanitary Certification A Presentation by the International Plant Protection Convention Secretariat.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
The Secure Sockets Layer (SSL) Protocol
Training for developers of X-Road interfaces
Unit 3 Section 6.4: Internet Security
Secure Sockets Layer (SSL)
e-Health Platform End 2 End encryption
IPPC Secretariat 20 November 2012 Vittoria City, Brazil
BY GAWARE S.R. DEPT.OF COMP.SCI
ePhyto – IPPC Solutions
Choosing the Discovery Model Martin Forsberg
Fun gym Cambridge Nationals R001.
The 3rd IPPC Global Symposium on ePhyto
Pooja programmer,cse department
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
The Secure Sockets Layer (SSL) Protocol
Architecture Competency Group
JOSIAH SYANDA Name of Session: Session 5: Technologies and Innovation in Phytosanitary Systems IMPLEMENTATION OF ELECTRONIC CERTIFICATION.
GHANA’S EXPERIENCE IN PREPARING FOR THE ePHYTO SYSTEM
Electronic Payment Security Technologies
Presentation transcript:

Supports the development & implementation of a IPPC Global ePhyto Hub to: Utilize modern Cloud technology. Ensure there is a secure folder for each countries’ certificate information. Reduce the complexity and rigidity of bilateral exchanges Simplify setup and ongoing maintenance for participating countries = lower cost. Improve visibility of certificate exchanges. Separate the message carrier (envelope) from the actual certificate information payload making it more flexible and modular – not hard coded together. Use internet standard security SSL certificates = lower cost for participating countries.

Ensure the sender NPPO identity. Ensure the receiver NPPO identity. Is highly configurable. Allows for the push/push method as well as push/pull method to achieve the ePhyto message exchange. Is highly extensible - allows for extended NPPO functionality without the need to ask the HUB service provider for changes in their service. Allows for the inclusion of other Transmission Protocols (for example, secure SMTP)

Hub Country B Country A Software to Software Country C Country D NPPO to NPPO ePhyto Certificate Information Exchange through the Hub.

Country B Country A Software to Software Country C Country D

Use of the hub is Voluntary. Some countries will choose to continue to use paper certificates for a long time. Some countries may prefer point to point transmission. Paper certificates will continue to be used – countries will agree bilaterally when to use only electronic exchange. Start using the hub when you are ready – 1 year, 5 years, 10 years... Security and confidentiality is paramount. ePhytos are encrypted for transmission and not opened by hub. Costs of maintaining the hub are carried by the users of the hub. Participating countries will require a National System to exchange ePhyto data with the Hub. The Hub will conduct verification on the transmitted ePhytos (envelopes only). The content verification is only accomplished through the “contract” that the participants of the hub must sign before they can participate on the HUB. This is, the HUB doesn't validate the ePhyto (message content) content.

Introduction In a secure electronic transmission the identity of the message sender must be ensured. In order to achieve this goal there are a lot of method to ensure the identity. For example, a login with user and password, a signature, etc.. Nowadays, NPPOs which already has implemented an electronic exchange are achieving the sender identity ensuring in different ways. To maintain the authentication in an abstract manner, an authentication server is proposed. It must provide a way to obtain credentials and a method to validate credentials. The method by the credential has been obtained is not important for the receiver (user/password, signature, etc.).

In order to ensure the sender identity, the importer NPPO, the exporter NPPO as well as the HUB must interact with the Authentication server. The following slides tries to explain the interaction between the exporter NPPO, the importer NPPO, the Authentication server and the HUB server.

Hub Server Exporter NPPO Importer NPPO Authentication Server 1. LoginWithXXX() 2. Exporter credential 3. receiveMessage (includes exporter credential) 4. Verify exporter credential 5. verifyCredential response 6. LoginWithXXX() 7. HUB credential 8. receiveMessage (includes HUB credential) 9. Verify HUB credential 10. verifyCredential response

The receipt of the export NPPO ePhyto message by the HUB, and the delivery/sending of the ePhyto message by the HUB to the destination/import NPPO do not need to be simultaneous. The ePhyto messages are only to be kept in the hub temporarily, (i.e. until they are confirmed as received by the final destination NPPO). Use of the Hub is voluntary. Participating NPPOs MUST register with the Hub to participate on the Hub. Registered participating NPPOs will to have a National System to prepare ePhyto messages and exchange and receive ePhyto messages through the Hub. The Hub validates export NPPO id and the import NPPO id on the ePhyto message envelopes only. Verification of the ePhyto message “content”is undertaken by the import NPPO. The HUB does NOT validate the ePhyto message content.

To assist in the understanding of our Hub goal/objective we use pictures of the post office mail pathway with explanatory text to explain security and authentication steps: The following slides explain the functionality of the HUB service to achieve a completely secure transmission.

1.The export NPPO national system (sender) prepares the certificate data (i.e. writes the letter). 2.The export NPPO national system (sender) authorises the issuance the XML phytosanitary certificate data set (equivalent to signing a letter). This action ensures the content can not be altered, the certificate is an original (i.e. message encryption through the use of private and public key security processes). It is not agreed yet. 3.The export NPPO national system ask for a credential to the Authentication authority. The credential is analogous to a stamped ticket that only the authentication authority is capable to determine its validity. 4.The export NPPO national system inserts the XML ePhyto message and the credential into an envelope. This step ensures authenticity of the sender NPPO identity, and set free to the importer NPPO of the duty of validate the sender identity.

The envelope contains data to facilitate the delivery envelope (credential, message itself, sender NPPO id, receiver NPPO id, message date, message id). 5.The export NPPO envelope containing the XML ePhyto message and the export NPPO credential is delivered to the Hub (post office). Secure delivery is visualised by the armoured truck. This is to emphasise the secure delivery of the envelope. This also ensures that the initial receiver will be the Hub (post office). 6.The Hub (post office) verifies the envelope data (i.e. asks to the authentication authority for the authentication of the exporter NPPO credential; if it is valid, then the export NPPO identity is ensured).

7.The envelope is saved in the Hub (post office) until sent to the destination import NPPO. The security of the envelope at this stage is responsibility of the Hub (post office). 8.When the envelopes is to be sent to the import NPPO, the HUB (post office) searches the Hub storage folders, retrieves the envelopes and sends these to the import NPPO. 9.In order to the import NPPO could be sure of the HUB identity, the HUB needs to ask for a credential to the Authentication authority. 10.All this envelopes are introduced in a new envelope that also contains the HUB credential.

11.The delivery of the new envelope to the import NPPO is also a secure transmission as visualised by an armoured truck (HTTPS). 12.Once that the message is received by the destination import NPPO, it asks to the authentication authority for the authentication of the HUB credential; if it is valid, then the HUB identity is ensured). 13.The destination import NPPO opens the envelope, obtains the messages (original envelopes), and depending of the type of each message the NPPO decides what to do. In the case of an ePhyto message where the content is phytosanitary data, the import NPPO national systems internal process may only involve saving the message, verifying the version, verifying mandatory fields, etc.

The message content could also be, for example, the rejection of an ePhyto, the withdraw of an ePhyto, the clearance confirmation, etc. This unique method of operating through the Hub allows us to extend the number & type of message transactions without changes to the HUB services. We may only need to have the Hub service provider count the number of new message types. For example, our request may be for the number of ePhytos transacted, and the number of response messages associated with each ePhyto (e.g. provision of a report listing messages against the list of ePhytos). Important to note; this can be achieved without any change in the HUB functionality.