SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Digital Identity & Security Serendipity Interactive Ltd & Glasgow Caledonian University Michael Bromby & Laura Reid
What is the problem? ,[object Object],[object Object],[object Object],vs.
Solution – A Signature ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Signatures Regulations 2002 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PKI – Public Key Infrastructure ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public Keys - Alice & Bob
PKI -  linked to data & signatory ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Security - Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],********
Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Non-Repudiation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Good Issuance – Identify Signatory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trust Chain Serendipity Trusted Root Company Lawyers/ accountants/  notarised services Company Issuer Ordinary Public Employees Background / database /  server
Pros and Cons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Digital Identity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions or Comments Contact:  [email_address]

Weitere ähnliche Inhalte

Was ist angesagt?

Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key InfrastructureChin Wan Lim
 
Mobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsMobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsPieter Ennes
 
electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engFrank Mercado
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...PiyushHipparkar
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature pptNitesh Dubey
 
Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Werner Keil
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinNicholas Davis
 
VidSigner by ValidatedID Biometric Signature
VidSigner by ValidatedID Biometric SignatureVidSigner by ValidatedID Biometric Signature
VidSigner by ValidatedID Biometric SignatureDaniel Translateur
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 

Was ist angesagt? (19)

Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Future of Public Key Infrastructure
Future of Public Key InfrastructureFuture of Public Key Infrastructure
Future of Public Key Infrastructure
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Mobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsMobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patterns
 
electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_eng
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
digital signature ppt
digital signature pptdigital signature ppt
digital signature ppt
 
Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Pki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University WisconsinPki Digital Id Itmc University Wisconsin
Pki Digital Id Itmc University Wisconsin
 
VidSigner by ValidatedID Biometric Signature
VidSigner by ValidatedID Biometric SignatureVidSigner by ValidatedID Biometric Signature
VidSigner by ValidatedID Biometric Signature
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
DSC E-Sign File Attachment
DSC E-Sign File AttachmentDSC E-Sign File Attachment
DSC E-Sign File Attachment
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 

Ähnlich wie Digital Identity & Security

The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01Damrongsak Kobtakul
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraeMudhra dsc
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxArchana833240
 

Ähnlich wie Digital Identity & Security (20)

The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01CoverSpace : Certificate authority for internal use plus e tax and e-policy01
CoverSpace : Certificate authority for internal use plus e tax and e-policy01
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Digital Signature Agency
Digital Signature AgencyDigital Signature Agency
Digital Signature Agency
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 

Mehr von Michael Bromby

Prosecuting Santa Claus - seminar fun for law students
Prosecuting Santa Claus - seminar fun for law studentsProsecuting Santa Claus - seminar fun for law students
Prosecuting Santa Claus - seminar fun for law studentsMichael Bromby
 
Law school of 2025 #slsbristol plenary
Law school of 2025 #slsbristol plenaryLaw school of 2025 #slsbristol plenary
Law school of 2025 #slsbristol plenaryMichael Bromby
 
Mapping Social Media in Legal Education - SLS 2012 Conference Poster
Mapping Social Media in Legal Education - SLS 2012 Conference PosterMapping Social Media in Legal Education - SLS 2012 Conference Poster
Mapping Social Media in Legal Education - SLS 2012 Conference PosterMichael Bromby
 
National law student forum
National law student forumNational law student forum
National law student forumMichael Bromby
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliographyMichael Bromby
 
OU Visual Evidence Programme
OU Visual Evidence ProgrammeOU Visual Evidence Programme
OU Visual Evidence ProgrammeMichael Bromby
 
Jury Symposium Outcomes & Plans 2010
Jury Symposium Outcomes & Plans 2010Jury Symposium Outcomes & Plans 2010
Jury Symposium Outcomes & Plans 2010Michael Bromby
 
The Effect Of Narrativisation On The Comprehension Of Jury Instructions
The  Effect Of Narrativisation On The Comprehension Of Jury InstructionsThe  Effect Of Narrativisation On The Comprehension Of Jury Instructions
The Effect Of Narrativisation On The Comprehension Of Jury InstructionsMichael Bromby
 
Public Participation, Jurors And Citizenship
Public Participation, Jurors And CitizenshipPublic Participation, Jurors And Citizenship
Public Participation, Jurors And CitizenshipMichael Bromby
 
Identifying And Measuring Juror Bias About Forensic Science Evidence
Identifying And Measuring Juror Bias About Forensic Science EvidenceIdentifying And Measuring Juror Bias About Forensic Science Evidence
Identifying And Measuring Juror Bias About Forensic Science EvidenceMichael Bromby
 
A Trust In Legal Professionals Scale Implications For Jury Functioning
A Trust In Legal Professionals Scale Implications For Jury FunctioningA Trust In Legal Professionals Scale Implications For Jury Functioning
A Trust In Legal Professionals Scale Implications For Jury FunctioningMichael Bromby
 
Juror understanding of evidence
Juror understanding of evidenceJuror understanding of evidence
Juror understanding of evidenceMichael Bromby
 
What jurors do with evidence during jury deliberation?
What jurors do with evidence during jury deliberation?What jurors do with evidence during jury deliberation?
What jurors do with evidence during jury deliberation?Michael Bromby
 
Legal Systems and Court Structures
Legal Systems and Court StructuresLegal Systems and Court Structures
Legal Systems and Court StructuresMichael Bromby
 
What is the Quality of this New Digital Legal World?
What is the Quality of this New Digital Legal World?What is the Quality of this New Digital Legal World?
What is the Quality of this New Digital Legal World?Michael Bromby
 

Mehr von Michael Bromby (20)

Prosecuting Santa Claus - seminar fun for law students
Prosecuting Santa Claus - seminar fun for law studentsProsecuting Santa Claus - seminar fun for law students
Prosecuting Santa Claus - seminar fun for law students
 
All consuming MOOCs
All consuming MOOCsAll consuming MOOCs
All consuming MOOCs
 
Law school of 2025 #slsbristol plenary
Law school of 2025 #slsbristol plenaryLaw school of 2025 #slsbristol plenary
Law school of 2025 #slsbristol plenary
 
Mapping Social Media in Legal Education - SLS 2012 Conference Poster
Mapping Social Media in Legal Education - SLS 2012 Conference PosterMapping Social Media in Legal Education - SLS 2012 Conference Poster
Mapping Social Media in Legal Education - SLS 2012 Conference Poster
 
National law student forum
National law student forumNational law student forum
National law student forum
 
Simulated learning
Simulated learningSimulated learning
Simulated learning
 
Annotated bibliography
Annotated bibliographyAnnotated bibliography
Annotated bibliography
 
OU Visual Evidence Programme
OU Visual Evidence ProgrammeOU Visual Evidence Programme
OU Visual Evidence Programme
 
Brain Imaging
Brain ImagingBrain Imaging
Brain Imaging
 
Research and The Law
Research and The LawResearch and The Law
Research and The Law
 
Jury Symposium Outcomes & Plans 2010
Jury Symposium Outcomes & Plans 2010Jury Symposium Outcomes & Plans 2010
Jury Symposium Outcomes & Plans 2010
 
The Effect Of Narrativisation On The Comprehension Of Jury Instructions
The  Effect Of Narrativisation On The Comprehension Of Jury InstructionsThe  Effect Of Narrativisation On The Comprehension Of Jury Instructions
The Effect Of Narrativisation On The Comprehension Of Jury Instructions
 
Public Participation, Jurors And Citizenship
Public Participation, Jurors And CitizenshipPublic Participation, Jurors And Citizenship
Public Participation, Jurors And Citizenship
 
Identifying And Measuring Juror Bias About Forensic Science Evidence
Identifying And Measuring Juror Bias About Forensic Science EvidenceIdentifying And Measuring Juror Bias About Forensic Science Evidence
Identifying And Measuring Juror Bias About Forensic Science Evidence
 
A Trust In Legal Professionals Scale Implications For Jury Functioning
A Trust In Legal Professionals Scale Implications For Jury FunctioningA Trust In Legal Professionals Scale Implications For Jury Functioning
A Trust In Legal Professionals Scale Implications For Jury Functioning
 
Juror understanding of evidence
Juror understanding of evidenceJuror understanding of evidence
Juror understanding of evidence
 
What jurors do with evidence during jury deliberation?
What jurors do with evidence during jury deliberation?What jurors do with evidence during jury deliberation?
What jurors do with evidence during jury deliberation?
 
BILETA 2010
BILETA 2010BILETA 2010
BILETA 2010
 
Legal Systems and Court Structures
Legal Systems and Court StructuresLegal Systems and Court Structures
Legal Systems and Court Structures
 
What is the Quality of this New Digital Legal World?
What is the Quality of this New Digital Legal World?What is the Quality of this New Digital Legal World?
What is the Quality of this New Digital Legal World?
 

Kürzlich hochgeladen

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Digital Identity & Security

  • 1. Digital Identity & Security Serendipity Interactive Ltd & Glasgow Caledonian University Michael Bromby & Laura Reid
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Public Keys - Alice & Bob
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Trust Chain Serendipity Trusted Root Company Lawyers/ accountants/ notarised services Company Issuer Ordinary Public Employees Background / database / server
  • 14.
  • 15.
  • 16. Questions or Comments Contact: [email_address]

Hinweis der Redaktion

  1. Thank you for inviting me Name I work for a company called SI based here in Glasgow city centre. The project I’m working on is a KTP project. KTP Background DTI funded partnerships to facilitate the exchange of knowledge between an Academic Institution that has the knowledge and the Company, which has the idea, by means of an Associate, me. My job is to take the idea and the knowledge and transform that into a viable result. Knowledge Transfer Partnership 27 month DTI funded project GCU and Serendipity Interactive Glasgow Combine PKI and Biometric Technology Establish secure framework Identify legal/compliance requirements Rational – gap in the market Outcomes – secure issuance process Knowledge transfer – legal side Future plans - expand to other applications that implement the digital identity Intro – discussing local vs global and trust Digital signature + legal requirements eg Electronic communications act PKI Non-repudiation + legal + identity security + biometrics + USB Future * * * My project is a partner ship between a software development company called Serendipity Interactive (based in Glasgow) and the Glasgow Caledonian University Law School. My project came about when Serendipity Interactive spotted a gap in the current market. What they realised was missing was a secure, non-repuditable, electronic identity and this is the basis of my project.
  2. Simply put, my project revolves around the question, “Do you know who you’re communicating with when you use any form of electronic communication?” Traditionally, communication took place on a ‘local’ level. You generally only conducted business with people you knew or had met, or that someone you knew and trusted had met. You relied on reputation, word of mouth, face to face meeting. You believed that people were you they said they were. And this was almost always true – In the realm of local communication there is a type of peer pressure. For your business to be successful, you have to trust your clients and your clients have to trust you. If any party breaks this trust word will get around and people will be very reluctant to deal with that party, so there is no advantage to it. However, the world is a much bigger place and communication takes places on a global scale, which is very different. There is no face to face established trust and no person that can vouch for both parties. Also, many communications may be one time affairs so there is no incentive to establish a trust relationship. There is also the physical aspect to any communication. On a local scale, goods or services are physically exchanged for a tangible cheque or cash – so often there is no need for trust. If a contract, it will be a physical piece of paper that the parties can sign, and can be identified as having being altered. When communicating on a global level, this isn’t the case. Goods will likely have to be delivered, so either the supplier will have to send goods and trust that the recipient pays him, or vice versa. If you’re dealing with contracts then it is very straightforward to alter an electronic document. My project involves the need for proof of, and security, of identity.
  3. Traditionally, this wasn’t really a problem. The standard form for proof of identity was your signature. Implication of: Authentication – this is the original document Authorisation – that you’re allowed to sign this document Integrity – that the document is unchanged Non-repudiation – signature is personally yours Even if there was the risk of forgery, measures were taken to prevent this and there was still the aspect of knowing who you were dealing with, so a signature was rarely proving your identity, rather signifying your agreement. In many cases, a written signature is still the default stance when it comes to signing contracts, but as the introduction of chip and pin is illustrates even that is no longer the only option. The big problem is for businesses dealing with each other all around the world, in cases where physically signing is document, such as a contract, is still the norm. But the global nature makes this is a very difficult job – a contract with three signatories all in different countries could mean a month before a contract was signed. The ideal solution would be to sign an electronic document, but electronic documents can be easily altered and hand written signatures are awkward to transmit, and, without the local peer pressure, hand written signatures are easily forged. The solution is to be able to prove who you are, you’re identity and be able to do it in an electronic fashion. A Digital proof of identity that could be used to mark or ‘sign’ documents electronically.
  4. Both the electronic communications act 2000 and The Electronic Signatures Regulations 2002 deal with electronic signatures. The first through ensuring what an electronic signature will do and the second in defining what and electronic signature is. This matches three out of our four criteria for a signature: Authentication Non-repudiation Integrity The only one missing is authorisation, which is external to the electronic signature and must be dealt with separately.
  5. Once we knew the criteria that the solution must meet, we were able to put together a solution that we could implement. uniquely linked to the signatory & linked to the data to which it relates in such a manner that any subsequent change of the data is detectable - Fulfilled by PKI capable of identifying the signatory - An issuance process that encompasses identity as well as issuance of PKI created using means that the signatory can maintain under his sole control - PKI is issued to a token that is biometrically secure.
  6. One method of digital signing is to use PKI, Public Key Infrastructure. Consists of a ‘public’ and ‘private’ key, where keys are codes that are used to encrypt or decrypt data. In PKI the two keys are different but connected, and what one encrypts the other decrypts.
  7. To see how this works, consider Alice and Bob: Alice and Bob wish to communicate in private and keep the data secret They have enemies who want to discover and/or alter the data: Carol and Dave - impersonating Eve - eavesdropping Private Key Authenticates – key must be secure Ensures Integrity – using a hash function Public Key Encryption Verifying authentication and integrity
  8. The next part of our implementation is to consider how to keep the private key secure, ie so that only you can use it – to meet the advanced signature requirements. Security comes in three parts: What you know What you have What you are The solution we are implementing uses something you have with some thing you are – a usb drive with biometric authentication. This means that only you can access the usb and use the private key. The combination of biometrics and pki mean that your digital signature is non-repudiatable. Ie you cannot deny that you signed a document that has you digital signature on it.
  9. The usb token can only be accessed by scanning your fingerprint on it. And the usb token is the only place that has your ppki key. Biometrics – fingerprint combined with electronic signature – it associates security with personal identity.
  10. Non-repudiation is one of the cornerstones of this project and is closely related to the biometric token. The token is used to authenticate the user as the owner of the token by matching scanned fingerprint to the fingerprint algorithm stored on the bio-token. This fingerprint authentication then allows the user access to the private key on the token with which they can then sign documents. This functionality allowed by the token will be key to implement the requirements of the project, namely: to guarantee the identity of a signatory or that of someone accessing a system. The fingerprint scanning, combined with the private key will enable this to happen, but it is dependant on the identity of the user being verified to being with and consequently the bio-token being issued to the correct person. This requires a good issuance process.
  11. Now that we have the capability of signing documents and keeping the signature secure, we come to the cornerstone of the project. All this is useless if we cannot determine who exactly we are talking to. As I mentioned at the beginning, we no longer have prior acquaintance with people we communicate with, so it is not enough to be sure that a communication hasn’t been tampered with and can only have come from one person; we need to know who that person is. To do this, we require a process which confirms the identity of the person being issued with a PKI key and is a process that we can trust. The solution we decided upon is a standard process that every key recipient is required to go through before they can get their key, which requires the key recipient to basically prove that they are who they say they are. The key aspect is that this process will be standardised – everyone will go through the *same* process. It will also follow the trust chain model that is inherent in public key infrastructure. One person is incapable of issuing every single key, so trust will be delegated to other trusted organisations and individuals.