ENotarization in British Columbia Presentation for the National Notary Association by… G. W. Wayne Braid Secretary / Executive Director The Society of.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Add Governors Discretionary (1G) Grants Chapter 6.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
1 Pretty Good Privacy (PGP) Security for Electronic .
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
Taxpayers registration and e-services provided by the Estonian Tax and Customs Board Karin Aleksandrov Chief Expert Service Management Department.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Welcome to Instructions and tips for the online application process 1 June 2012.
GEtServices Services Training For Suppliers Requests/Proposals.
E-Filing a Document Thursday, June 14, 2012 Dwight E. Brock Collier Clerk of Courts.
20&27 May Agenda 1.Highlight the difference between system flow of e- Invoice and paper invoice – 15 minutes 2.Demonstrate the operation procedure.
Everything You Wanted to Know About Grants.gov. Through the Eyes of the Applicant Register, Find, and Apply.
Prepared & Designed by MIS SECTION MGNREGA, JALPAIGURI
Objectives © Paradigm Publishing, Inc. 1 Objectives.
Click on Login after filling User Id. Click on Select Certificate.
Customer Service Module Course Contents Table of Contents Enter A Request Search A Request Create Invoice (Funeral home request) Search Invoice Manage.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Application of Digital Signatures: Case Studies Jagdeep S Kochar Executive Director.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Summer School Certificates Diego Romano & Gilda Team.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Land Registration Electronic Submission Across Canada.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Welcome to the Electronic Permit Submittal and Processing System (EPSAP) Professional Engineer Submittal Instructions.
12 th XBRL International Conference National Tax Agency JAPAN.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure Electronic Transaction (SET)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
DEVELOPING WEB TRANSACTIONAL CAPABILITIES IN ATF ATF’s E Filing Strategies.
1. The applicant, as an alternative to submitting applications in the usual manner in the concerned office, can submit the application to a CHO i CE Agent.
Cryptography, Authentication and Digital Signatures
 In Karnataka, Digital Signatures are being extensively used in various projects right from delivery of citizen centric services through various projects.
1. Chapter 25 Protecting and Preparing Documents.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 11 Committed to Shaping the Next Generation of IT Experts. Chapter 9 Bulletproofing the Database.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Prepared by CMSD Office of the Chief Financial Officer - September, OnBase Vendor Management: New Vendor Request Processing.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
HPHConnect New User Registration Tutorial A Guide for Harvard Pilgrim Providers August 2005.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
United States District Court for the District of Utah Welcome to ECF Attorney Training. Please make sure you have picked up all materials located at the.
DIGITAL SIGNATURE.
® Time Saving eSigning Tips with zipLogix Digital Ink Amy A. Ulloa zipForm Products Coordinator CALIFORNIA ASSOCIATION OF REALTORS ® ®
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Digital Disruption, Alfresco, and Digital Signatures Brian LaPointe VP Sales, Americas CoSign by ARX.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Unit 3 Section 6.4: Internet Security
Welcome to the Electronic Permit Submittal and Processing System (EPSAP) Professional Engineer Submittal Instructions.
Cryptography And Network Security
Digital Signatures and Forms
E-cert (Digital Certificate)
To the ETS – Encumbrance Online Training Course
Digital Certificates and X.509
E-cert (digital certificate)
Vendor Management: New Vendor Request Processing
To the ETS – Encumbrance Online Training Course
Presentation transcript:

eNotarization in British Columbia Presentation for the National Notary Association by… G. W. Wayne Braid Secretary / Executive Director The Society of Notaries Public of BC

Project Scope Electronic Submission and Filing Transfer of Title/Deed Mortgage Discharge of Mortgage Discharge of Financial Encumbrances Digital registration of Land Surveys PTT Payment Electronic Funds Transfer Front-end to existing Land Title System

Current Workflow DOCUMENTS ARRIVE PROCESS AT COUNTER Collect fees & Taxes Timestamp-priority Assign number(s) POST PENDING APPLICATION TO REGISTRY Against parcel(s) Priority sequence Within 15 minutes SCAN DOCUMENTS OPTICAL STORAGE documents Survey plans QUEUE ITEMS FOR EXAMINIER REGISTRATION Work assignment Image documents Priority sequence

DOCUMENTS ARRIVE PROCESS AT COUNTER collect fees & taxes timestamp - priority assign number(s) POST PENDING APPLICATIONS TO REGISTRY against parcel(s) priority sequence within 15 minutes QUEUE ITEMS FOR EXAMINER REGISTRATION work assignment image documents priority sequence SCAN DOCUMENTS OPTICAL STORAGE documents survey plans ELECTRONIC FRONT COUNTER DOC PDF FORMS Present Manual Registration System

Over 950, 000 manual transactions per year 30% by year end 2006

Adobe Acrobat Form-A

Professional Electronic Filing USER DESKTOP forms preparation forms printing digital signature data import / export Adobe Acrobat (PDF) BCONLINE PORTAL user registration deposit account user help desk INTERNET ELECTRONIC FRONT COUNTER submit documents collect fees & taxes verify dig signature timestamp - priority assign number(s) post pending application to registry convert form to compatible image format QUEUE ITEMS FOR EXAMINER REGISTRATION work assignment image documents priority sequence Notifiers

CERT Document Signature Verification Cert Reg Certificate Registry from Juricert (Law Society of B.C.) Relaying Party (EFS) SIG DOC Certificate validity is explicitly defined in the Certificate Registry

Digital Certification Model subscriber 1. Adobe Acrobat Generate key pair 2. Encrypt & store private key CERT USER NAME EXPIRY DATE CERT SERIAL 3. Create Adobe user self-signed X.509 Certificate Registration Authority (Law Society of BC) 4. Send Reg Form & Certificate CERT REG 6. Remove Certs when revoked 5. Add valid Certs to Cert Register

Not like a rubber stamp

Not like a postage stamp that you “affix”

Digital Signatures Make use of advanced mathematics and cryptography The math has been know for years, it is modern computers that allow us to do this on the desktop on the fly We, fortunately, do not have to understand the math Basic techniques include the calculation of a “hash”, and the use of cryptographic key pairs. Digital Signature – “an encrypted hash of a computer file”

Much more like ink on paper…

“Hash” Values (SHA1) “This is a Transfer of Land - PID ” 74 5F E E9 E6 EB 22 C D1 DF 34 A1 1B “This is a Transfer of Land - PID ” A9 9A F8 DA 50 A3 66 5D FD D1 45 E1 44 FE % of the bits differ (82 of 160)

The digital signature on the PDF file… On this fraudulent transfer the officer certification was completely fictional …prevents document changes and allows for the identification of the person who signed it.

On this mortgage discharge the paper document was altered after the valid officer certification was completed.

Your Digital Certificate File (.apf or.pfx) contains Use is controlled by by the need to have a copy of this file and knowledge of the password “Your Certificate” Identification and Issuance Information Your Private Key Your Public Key

Example Acrobat Form B Wayne’s Certificate Identification and Issuance Information Wayne’s Private Key Wayne’s Public Key You “click” on the form’s digital signature box, entering your password when prompted

First Step Acrobat calculates a hash of the form B Hash of the Form

!! TOP SECRET !! Second Step the program encrypts the hash with the private key, result is added to the form Hash of the Form Wayne’s Certificate Identification and Issuance Information Wayne’s Private Key Wayne’s Public Key

!! TOP SECRET !! Hash of the Form Wayne’s Certificate Info and Public Key Identification information and the public key are added to the form Wayne’s Certificate Identification and Issuance Information Wayne’s Private Key Wayne’s Public Key

!! TOP SECRET !! Hash of the Form Wayne’s Certificate Info and Public Key The digital signature is the encrypted hash of the file together with some certificate information The “look” of the PDF changes showing that it has been signed

!! TOP SECRET !! Hash of the Form Wayne’s Certificate Info and Public Key LTO uses the certificate info. to see if Braid is an authorized submitter Juricert Data Base

Phase One passed The LTO knows who signed the file and that person is OK to sign EFS forms (and that they are a Lawyer or Notary in good standing)

Phase Two Is the document that the LTO has received exactly the same as the document that was signed by the Lawyer or Notary?

The public key is used to decrypt the hash !! TOP SECRET !! Hash of the Form Wayne’s Certificate Info and Public Key

The Acrobat program calculates a new hash of the Form B Hash of the Form Wayne’s Certificate Info and Public Key LTO calculated Hash of the Form !! TOP SECRET !!

The two hash values are compared Hash of the Form at time of signing LTO calculated Hash of the Form

If they are the same, the LTO can have complete confidence that there have not been any alterations of the document Hash of the Form at time of signing LTO calculated Hash of the Form

And you can have confidence that what you signed cannot be altered by anyone without detection Hash of the Form at time of signing LTO calculated Hash of the Form

With “phase two” passed, the EFS system then proceeds to deal with the information in the form itself (PID, etc.)

If a signed PDF file is modified… …it is immediately obvious

Digital Certificate Selection Managed X5.09 Certificate authenticated by Juricert usable with and other systems – subscription fees apply –

Juricert Registration at Juricert.com