Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Cryptography and Network Security
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Electronic Transaction Security (E-Commerce)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Cryptographic Technologies
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 8 Web Security.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure Ammar Hasayen ….
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
LU Chenglong ( ) DIAO Wenrui ( )
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Chapter 9: Payment System for Electronic Commerce.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
DIGITAL SIGNATURE.
Fifteenth groups. TAIKANGLIF—Your most trusted friend Taikang Life was founded in August 22, 1996 Headquartered in Beijing, Chang'an Avenue.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Digital Signatures and Digital Certificates Monil Adhikari.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Electronic Banking & Security Electronic Banking & Security.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )

CFCA Enterprise Brief introduction Contents 2 CFCA Architecture 3 E-commerce Developing 4 Summary 5 CA 、 PKI Brief introduction 1

Logo CA CA is the entity PKI communication system trusted by both sides, known as a trusted third party (Trusted Third Party, referred to as TTP) CA as a trusted third party, one important condition is that the behavior of CA has a non-repudiation. As a third party rather than simply superiors, they must allow the trustee has the ability to pursue their own responsibility. CA certificate confirmed by public information to others, there is CA's signature on the certificate. If the user because the result of the loss of trust certificates, the certificate can be used as evidence for effective legal accountability of CA. It is because CA is willing to give a commitment to take responsibility, it is also known as a trusted third party.

Logo CA In many cases, CA and users are independent entities, CA as a service provider, there may be a problem because of the quality of service (for example, release of public data error) while giving users a loss. Certificate binds a public key and a corresponding private key owner's identity, and with CA's digital signature. Certificate also contains the name of the CA (in the figure LOIS CA), in order to find the relying party CA's public key to verify the digital signature on the certificate.

Logo PKI PKI (Public Key Infrastructure) or "public key infrastructure" is a follow established standards for key management platform, which provides encryption and digital signatures and cryptographic services necessary key and certificate management system for all network applications in simple terms, PKI is the use of public key theories and technologies to provide security services to build infrastructure. PKI technology is the core of information security technology, but also e- commerce The key and basic techniques.

CFCA Enterprise Brief introduction CFCA(China Financial Certification Authority) It is the national authority of the People's Bank of China Financial Certification bodies lead, combined 14 national commercial banks jointly established It is the only third-party online professional trust services to fully support a secure e- commerce payment services

CFCA Enterprise Brief introduction CFCA responsible for providing services to a variety of digital certificate authentication requirements of e- commerce, online transactions for the parties involved in providing information security, the establishment of mutual trust mechanism to achieve confidentiality of electronic transactions on the Internet, authenticity, integrity and non-repudiation. Involved in developing trading rules about online safety, establish appropriate technical specifications and action norms, providing online payment, especially online interbank payment services such as mutual authentication.

CFCA Enterprise Brief introduction

CFCA CFCA Architecture

CFCA CFCA Architecture Advanced Certificate in Enterprise Personal Advanced Certificate Enterprise General Certificate Personal General Certificate Server Certificate Phone certificates security certificate VPN device certificate Code Signing Certificates CFCA Certificate species :

CFCA E-commerce Developing Online identity authentication based on PKI PKI-based secure transmission of information It PKI-based electronic signature service PKI-based secure Timestamp-based PKI service PKI-based secure electronic seal 电子商务业务应用:

CFCA E-commerce Developing Revenue model: a certificate and certification services to clients, customers pay an annual fee. As of 2008, the amount of the certificate issued CFCA has exceeded 5 million, of which 80% payment in the banking sector, the digital certificate of the nearly 30 banks in the use of CFCA issued. CFCA certificate approving authority to establish a bank Industrial and Commercial Bank of China, Agricultural Bank of China, China Construction Bank, Bank of Communications, Shanghai Pudong Development Bank, more than 60 banks, in addition to 18 securities companies, 23 fund companies and more than 30 large- scale enterprise Group, the financial services company to provide a certificate. Revenue model :

CFCA Summary Promote the development of online banking to further improve the CFCA. ? Reliability and security of online banking surge in volume of the system will bring a greater challenge. ? With the increase in business volume, the various aspects of the function CFCA system, measures will need to be strengthened to ensure the security of online banking. Development of Internet banking for CFCA impact:

Logo Add Your Company Slogan Thank you