Electronic Filing Case Study NSW Land and Environment Court.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

(n)Code Solutions A division of GNFC
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
PKI Implementation in the Real World
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Configuring Active Directory Certificate Services Lesson 13.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Configuring Directory Certificate Services Lesson 13.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
DIGITAL SIGNATURE.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Presentation transcript:

Electronic Filing Case Study NSW Land and Environment Court

Presenters  Ron Walker Assistant Director, Business Systems Information Technology NSW Attorney General's Department  Sally Kay IT Advisor Law Society of NSW  Richard Weatherley Director & CTO Galexia

Outline  Project Overview and Objectives –Ron Walker  Role of the Law Society and Solicitors –Sally Kay  Technology and Issues –Richard Weatherley

Project Overview and Objectives  Ron Walker Assistant Director, Business Systems Information Technology NSW Attorney General's Department

Introduction  The pilot comprises three parts: 1. A Public Key Infrastructure (PKI) for secure filing of documents from solicitors to the Court 2. Filing of documents at the Court via a secure web application, the notification to the Court that a document has been received, and online payment processing 3. Receipt of the document by the Court with notification of document receipt sent to the firm that lodged it.

Stakeholders Pilot Project Solicitors

Objectives  Primary Objective: –“proof of concept” for the electronic exchange of documents within the legal sector utilising PKI  Specific Objectives: –Provide mechanism for courts to define policies and standards for electronic document exchange –Identify court processes requiring re-engineering to exploit secure e-commerce transactions –Dispel fear barriers related to security for the growth of e-commerce within the legal sector –Prove PKI technical concepts & allow Law Society of NSW to evaluate issuing digital certificates to lawyers

Requirements  Simplicity  Digitally signed filing  Encrypted filing  Online payment for documents attracting filing fees  Digitally signed receipts  Secure document retrieval  Not evaluating Court document processing

Constraints  Limited budget  Short development timescale  Short pilot phase  Class 4 Court documents only  Run in parallel with real manual system –Initiating –Online payments are not cleared

Law Society and Solicitors  Sally Kay IT Advisor Law Society of NSW

What is PKI?  Public Key Infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet  PKIs integrate digital certificates, public- key cryptography, and certificate authorities into a shared network security architecture, including: –issuance of digital certificates to individual users –end-user enrolment software –integration with corporate certificate directories –tools for managing, renewing, and revoking certificates

PKI provides four assurances  Authentication (who you are)  Integrity (what you sent)  Non-repudiation (you can’t deny it)  Confidentiality (what you can see)

What is a Digital Certificate?  A digital form of identification –Similar to a passport or driver’s licence –Binds subject’s public key (a mathematical value) to one or more attributes relating to their identity  A certificate is valid for a period of time, (often one, three or ten years)

Example Certificate

What are Certificate Authorities?  CAs issue digital certificates and validate the holder's identity and authority –PKIs and digital certificates are most trustworthy when they are vouched for by a trusted certificate authority.  CAs embed an individual's or an organisation's public key along with other identifying information into each digital certificate and then cryptographically "sign" it as a tamper-proof seal, verifying the integrity of the data within it and validating its use.

Why use a CA?  PKI is based on the concept of a certificate hierarchy. –The "root key" of this hierarchy links all certificates issued by the hierarchy and identifies the CA. –The root key must be recognised by all the various software applications that must verify and accept digital certificates in order to verify the authenticity of the information in the certificate.

What is a Registration Authority?  Performs subset of CA functions  Establishes and confirms identity of an individual  Initiates the certification process with a CA on behalf of individual end-users  Performs key and certificate lifecycle management functions

Role of Law Society in Project  The Law Society of NSW acted as the Registration Authority –Generate keys –Register certain end-user attributes –Submit public key and request to CA –Revoke certificates when required  Coordinating and supporting solicitors during pilot  Evaluating PKI technical concepts  Assessing the feasibility of issuing digital certificates to lawyers and firms  Reporting results and recommendations

Issuing Certificates  Baltimore Technologies selected as PKI vendor  Law Society used Baltimore Registration Authority (RA) software  Individual solicitors issued with certificates –Face-to-face –Approved by Law Society (peak sector RA) –Each certificate signed by Security Domain Pty Ltd –Issued as an electronic file on a floppy disk, containing certificate and private key –Each solicitor selects a passphrase to secure the file  Solicitors install cert and private key on their PC

Issuing and Filing Baltimore Root CA 2. Certificate Request Approved 4. Certificate Issued Solicitor 3. Certificate Returned Law Society Registration Authority 1. Certificate Request 5. Certificate Stored Directory Server 8. Certificate Checked ELodge Web Server 7. Sign and file a document Document Storage 9. Document filed ok 6. Certificate Installed

Problems/Issues  Are digital certificates necessary in the lodgement of court documents?  Do Law Societies have to be involved?  How should certificates be issued?

Technology and Issues  Richard Weatherley Director & CTO Galexia

Development  Galexia was selected to develop “ELodge” system  PKI development, including integration of Baltimore Technologies FormSecure product  Web-based user interface design  Provision of a document repository  Document storage and retrieval interface  On-line payment processing software  Server configuration  Technical documentation

How does it all work?

How does it all work? (2)

Login ********

Options

Lodge Document

Applicants and Respondents

Select files

Enter Passphrase ********

Signed

How does signing work?

Court Administration

Issues  Audit trail –Certificate expiry and document access –Certificate storage and key recovery  Multiple signatures, multiple documents  Browser-based lodgement –Thin-client PKI technology “work-in-progress” –Acceptable file formats  Is encryption/SSL really required?  Storing your certificates: smart cards, tokens …  The future: PDF, XML and e-forms plug-ins?

Issues (2)  Fifth PKI Assurance: contract formulation –Can digital signatures bind parties? –Varies by jurisdiction  Quality of Certification Services –Reliable digital signature = reliable certificate –Reliable certificate = reliable issuer  Reliance and Liability Limits –Some legislation permits certificates to include limits for relying on the certificate

Useful References  Introduction to Public-Key Infrastructure –  Some PKI Vendors –Baltimore: –Verisign: –Thawte: –Entrust:

Electronic Filing Case Study Questions

–Was the pilot a successful proof of getting HTML forms and/or documents digitally signed? –What issues did the pilot highlight with respect to digitally signing messages and/or documents? –How will documents requiring multiple signatures be digitally signed? –Could the project be extended to include other forms? –Did solicitors successfully make payments online? –Did users receive notification of receipt of the filed document? –Were court clerks able to process documents efficiently? –Was the court clerks’ response to the pilot positive? –What Court Rules need to be changed in order to allow for e- filing?