ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Public Key Infrastructure and Applications
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Electronic Filing Case Study NSW Land and Environment Court.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Elitex ’08 : Securing Indian Cyber Space Interoperability and Standardisation issues for India PKI Sivarama Krishnan Executive Director PricewaterhouseCoopers.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
Creating Trust in Electronic Environment - IT Act 2000 Deputy Controller (Technology) Controller of Certifying Authorities Ministry of Communications &
UN Economic Commission for Europe 23rd UN/CEFACT FORUM 7-11 April rd UN/CEFACT FORUM – Geneva Tahseen A. Khan Project Proposal : Trusted Third Party.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Digital Signatures. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original.
Facilitating Cross Border Trade and Commerce through Mutual Recognition of Digital Signatures/Certifying Authorities Controller of Certifying Authorities(CCA)
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Paper Less Digital Signature Issuance
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Configuring Directory Certificate Services Lesson 13.
1 UNECE Capacity Building Workshop on Trade Facilitation Implementation: October 2004 Electronic PostMark (EPM) Security & Authentication for eTrade Documents.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
DIGITAL SIGNATURE.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
company registration, india trademark registration, trademark attorneys india, patent attorneys india, patent registration india company registration,
visit : – Existing User Login
EPFO Digital Signature
NATIONAL ACADEMIC DEPOSITORY
ESign Aashutosh.
WELCOME TO YOUR DIGISIGN PVT. LTD.
Authentication.
Installation & User Guide
Digital Signature.
Digital Signature Certificate Provider Digital Signature Certificate Provider.
Digital Signatures and Forms
Installation & User Guide
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
WEQ-012 PKI Overview March 19, 2019
PKI (Public Key Infrastructure)
E-identities (and e-signatures)
National Trust Platform
Presentation By- BHISE D.S.(PROB.ACST,CPTP-4)
Presentation transcript:

eSign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications and Information Technology

The Information Technology (IT) Act 2000 The IT Act, 2000 provides legal sanctity to Digital signatures Digital signatures are accepted at par with handwritten signatures. Electronic documents that have been digitally signed are treated at par with paper documents signed in the traditional way. The IT Act provides the basic legal and administrative framework for e-commerce, and promotes its growth by creating trust in electronic environment.

Controller of Certifying Authorities The IT Act provides for the Controller of Certifying Authorities (CCA) to license and regulate the working of Certifying Authorities Certifying Authorities (CAs) issue Digital Signature Certificates(DSC) for authentication of users in cyberspace. Prior to issuing a DSC, the Certifying Authority (CA) is required to verify the credentials of the applicant as stated in the Application Form and in supporting documents that are attached.

Public Key Infrastructure (PKI) The Public Key Infrastructure (PKI) in the country comprises the CCA and the CAs, Users and Relying Parties, and policies and procedures The CCA is at the root of the trust chain hierarchy in India. As the foundation for secure Internet applications, it ensures authentic communications that cannot be repudiated.

Public Key Infrastructure

Issuance of DSC

Challenges in scaling up usage of Digital Signatures Personal digital signature requires person’s identity verification and issuance of USB dongle having private key, secured with a password/pin. Current scheme of physical verification, document based identity validation, and issuance of physical dongles does not scale to a billion people. The major cost of the DSC is found to be the verification cost. Certifying Authorities engage Registration Authorities to carry out the verification of verification of credentials prior to issuance of certificate. Physical USB Dongle compliant to mandated standards also adds to the cost. Relying on the DSC applicant's information already available on the public database is an alternate to Manual verification. UIDAI provides one such alternative.

Credential Verification Verification of the Proof of Identity (PoI) and Proof of Address (PoA) is a pre-requisite for issuance of Digital Signature Certificates by Certifying Authorities. As part of the e-KYC process of Aadhaar, the resident authorizes UIDAI (through Aadhaar authentication using either biometric or OTP to provide their demographic data along with their photograph (digitally signed and encrypted) to service providers.

eSign eSign facilitates digitally signing a document by an Aadhaar holder using an Online Service. Digital Signature is created using authentication of consumer through Aadhaar eKYC service. eSign is an integrated service that facilitates issuing a Digital Signature Certificate and performing Signing of requested data by authenticating Aadhaar holder. Aadhaar id is mandatory for availing eSign Service. Electronic Signature or Electronic Authentication Technique and Procedure Rules, 2015 has been notified to provide the legal framework

eSign Overview

eSign - Benefits  Save cost and time  Aadhaar e-KYC based authentication  improve user convenience  Mandatory Aadhaar ID  Easy to apply Digital Signature  Biometric or OTP (optionally with PIN) based authentication  Verifiable Signatures and Signatory  Flexible and fast integration with application  Legally recognized  Suitable for individual, business and Government  Managed by Licensed CAs  API subscription Model  Privacy concerns addressed  Integrity with a complete audit trail  Simple Signature verification  Immediate destruction of keys after usage  Short validity certificates  No key storage and key protection concerns.

Stakeholders Interaction