SlideShare una empresa de Scribd logo
1 de 24
©2013 Trusted Information Consulting Sp. z o.o.
Trust services for business
processes
Michał Tabor
Trusted Information Consulting
Międzyzdroje, EFPE 2013
©2013 Trusted Information Consulting Sp. z o.o.
Agenda
Cloud of Trust
Components of
the cloud
©2013 Trusted Information Consulting Sp. z o.o.
Motivation
Deliver electronic transactions
services suitable the business
Exploit the potential of experience in
building PKI
Learn from mistakes:
– Solutions not understandable for society
– Unfitted business model
©2013 Trusted Information Consulting Sp. z o.o.
Doing business
Employee - consultant
Employee wants to provide work and receive salary
Employer
Employer wants to have job done and have evidence for
accounting purposes
Need of
contract
©2013 Trusted Information Consulting Sp. z o.o.
Doing business
Employee - consultant
Employee wants to provide work and receive salary
Employer
Employer wants to have job done and have evidence for
accounting purposes
Need of
contract
Process of establishing
contract
Trustworthy
contract
Meets needs
and mitigates
risk
Meets needs
and mitigates
risk
©2013 Trusted Information Consulting Sp. z o.o.
Process of establishing
contract
Doing business
Employee - consultant
Employer
Need of
contract
Business process
Trustworthy
contract
©2013 Trusted Information Consulting Sp. z o.o.
Business process
PKI SIGNING
Employee - consultant
Employer
Need of
contract
Trustworthy
contract
©2013 Trusted Information Consulting Sp. z o.o.
Business process
Doing business
Employee - consultant
Employer
Need of
contract
Trustworthy
contract
?
Meets needs and
mitigates risk
Meets needs and
mitigates risk
?
©2013 Trusted Information Consulting Sp. z o.o.
Business process
Doing business
Employee - consultant
Employer
Need of
contract
Trustworthy
contract
Meets needs and
mitigates risk
Meets needs and
mitigates risk
Cloud of trust
©2013 Trusted Information Consulting Sp. z o.o.
Cloud of Trust
Workflow definition
User needs
definition
Workflows
User needs
©2013 Trusted Information Consulting Sp. z o.o.
Cloud of Trust
Risk mitigation
User
Commitment
Verification
Authorization
Confirmation
User
Authentication
eSignature
Trust
Security
Workflows
User needs
Evidence
©2013 Trusted Information Consulting Sp. z o.o.
Cloud of Trust
Risk mitigation
User
Commitment
Verification
Authorization
Confirmation
User
Authentication
User
Authentication
Trust
Security
Workflows
User needs
Evidence providers
©2013 Trusted Information Consulting Sp. z o.o.
Trust service
©2013 Trusted Information Consulting Sp. z o.o.
TRUSTED SERVICES
©2013 Trusted Information Consulting Sp. z o.o.
WORKFLOW SERVICE
Process control
Signatures collection
Other evidence collection
Document dissemination
Registred email
Trade portal
©2013 Trusted Information Consulting Sp. z o.o.
DOCUMENT REPOSITORY
Authenticity
Integrity
Long term preservation
Translation between
media, formats
Smart paper
Notary service
©2013 Trusted Information Consulting Sp. z o.o.
SIGNATURE SERVICE
Collects signature evidence
– Authentications
– Authorisations
– Cerificates
– Attributes
– Time
Signature creation assistance
Server Signing
Mobile Signing
Signature application for standard PKI
PKI 2.0 Lightweight Certificate
Signature
©2013 Trusted Information Consulting Sp. z o.o.
ATTRIBUTE SERVICE
Private data
Registers and databases
State based attributes
Declarations
External attribute
services
Bank confirmations
Trusted profile
STORK attributes
exchange
©2013 Trusted Information Consulting Sp. z o.o.
CONTROLS SERVICE
Authentication
Authorisation to signature service usage
Workflow based controls
Autorisation to attributes
usage
Cards, Keys, Passwords, SMSes, …
SAML Authorisation
Signing time frame, IP, workstation
restrictions, holds, …
©2013 Trusted Information Consulting Sp. z o.o.
SIGNING ENVIRONMENT
©2013 Trusted Information Consulting Sp. z o.o.
SIGNATURE SERVICE
©2013 Trusted Information Consulting Sp. z o.o.
MULTIPLE SERVICES
©2013 Trusted Information Consulting Sp. z o.o.
Trust exchange
©2013 Trusted Information Consulting Sp. z o.o.
Thank you for your attention
Michał Tabor
michal.tabor@pki2.eu
http://twitter.com/Michal_Tabor
http://pki2.eu

Más contenido relacionado

Destacado (10)

Miocardiopatias (el libro)
Miocardiopatias (el libro)Miocardiopatias (el libro)
Miocardiopatias (el libro)
 
Nitrogénio no solo
Nitrogénio no soloNitrogénio no solo
Nitrogénio no solo
 
Fostered treatment
Fostered treatmentFostered treatment
Fostered treatment
 
Planejamento Navesa Veículos
Planejamento Navesa VeículosPlanejamento Navesa Veículos
Planejamento Navesa Veículos
 
Miocardiopatías
MiocardiopatíasMiocardiopatías
Miocardiopatías
 
Short history of the spanish language
Short history of the spanish languageShort history of the spanish language
Short history of the spanish language
 
Ppt big data
Ppt big dataPpt big data
Ppt big data
 
Informatica
InformaticaInformatica
Informatica
 
STATUTOSOS
STATUTOSOSSTATUTOSOS
STATUTOSOS
 
Paul Hickey CV.
Paul Hickey CV.Paul Hickey CV.
Paul Hickey CV.
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Presentation for EFPE - Creating security services for business processes

  • 1. ©2013 Trusted Information Consulting Sp. z o.o. Trust services for business processes Michał Tabor Trusted Information Consulting Międzyzdroje, EFPE 2013
  • 2. ©2013 Trusted Information Consulting Sp. z o.o. Agenda Cloud of Trust Components of the cloud
  • 3. ©2013 Trusted Information Consulting Sp. z o.o. Motivation Deliver electronic transactions services suitable the business Exploit the potential of experience in building PKI Learn from mistakes: – Solutions not understandable for society – Unfitted business model
  • 4. ©2013 Trusted Information Consulting Sp. z o.o. Doing business Employee - consultant Employee wants to provide work and receive salary Employer Employer wants to have job done and have evidence for accounting purposes Need of contract
  • 5. ©2013 Trusted Information Consulting Sp. z o.o. Doing business Employee - consultant Employee wants to provide work and receive salary Employer Employer wants to have job done and have evidence for accounting purposes Need of contract Process of establishing contract Trustworthy contract Meets needs and mitigates risk Meets needs and mitigates risk
  • 6. ©2013 Trusted Information Consulting Sp. z o.o. Process of establishing contract Doing business Employee - consultant Employer Need of contract Business process Trustworthy contract
  • 7. ©2013 Trusted Information Consulting Sp. z o.o. Business process PKI SIGNING Employee - consultant Employer Need of contract Trustworthy contract
  • 8. ©2013 Trusted Information Consulting Sp. z o.o. Business process Doing business Employee - consultant Employer Need of contract Trustworthy contract ? Meets needs and mitigates risk Meets needs and mitigates risk ?
  • 9. ©2013 Trusted Information Consulting Sp. z o.o. Business process Doing business Employee - consultant Employer Need of contract Trustworthy contract Meets needs and mitigates risk Meets needs and mitigates risk Cloud of trust
  • 10. ©2013 Trusted Information Consulting Sp. z o.o. Cloud of Trust Workflow definition User needs definition Workflows User needs
  • 11. ©2013 Trusted Information Consulting Sp. z o.o. Cloud of Trust Risk mitigation User Commitment Verification Authorization Confirmation User Authentication eSignature Trust Security Workflows User needs Evidence
  • 12. ©2013 Trusted Information Consulting Sp. z o.o. Cloud of Trust Risk mitigation User Commitment Verification Authorization Confirmation User Authentication User Authentication Trust Security Workflows User needs Evidence providers
  • 13. ©2013 Trusted Information Consulting Sp. z o.o. Trust service
  • 14. ©2013 Trusted Information Consulting Sp. z o.o. TRUSTED SERVICES
  • 15. ©2013 Trusted Information Consulting Sp. z o.o. WORKFLOW SERVICE Process control Signatures collection Other evidence collection Document dissemination Registred email Trade portal
  • 16. ©2013 Trusted Information Consulting Sp. z o.o. DOCUMENT REPOSITORY Authenticity Integrity Long term preservation Translation between media, formats Smart paper Notary service
  • 17. ©2013 Trusted Information Consulting Sp. z o.o. SIGNATURE SERVICE Collects signature evidence – Authentications – Authorisations – Cerificates – Attributes – Time Signature creation assistance Server Signing Mobile Signing Signature application for standard PKI PKI 2.0 Lightweight Certificate Signature
  • 18. ©2013 Trusted Information Consulting Sp. z o.o. ATTRIBUTE SERVICE Private data Registers and databases State based attributes Declarations External attribute services Bank confirmations Trusted profile STORK attributes exchange
  • 19. ©2013 Trusted Information Consulting Sp. z o.o. CONTROLS SERVICE Authentication Authorisation to signature service usage Workflow based controls Autorisation to attributes usage Cards, Keys, Passwords, SMSes, … SAML Authorisation Signing time frame, IP, workstation restrictions, holds, …
  • 20. ©2013 Trusted Information Consulting Sp. z o.o. SIGNING ENVIRONMENT
  • 21. ©2013 Trusted Information Consulting Sp. z o.o. SIGNATURE SERVICE
  • 22. ©2013 Trusted Information Consulting Sp. z o.o. MULTIPLE SERVICES
  • 23. ©2013 Trusted Information Consulting Sp. z o.o. Trust exchange
  • 24. ©2013 Trusted Information Consulting Sp. z o.o. Thank you for your attention Michał Tabor michal.tabor@pki2.eu http://twitter.com/Michal_Tabor http://pki2.eu