Electronic Signatures: Business and Technology Implications Mass. Software and Internet Council - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Electronic Signatures: Business and Technology Implications Mass. Software and Internet Council

Description:

Supply chain and internal workflow efficiencies? ... used by at least 50% of enterprises for B to B and B to C extranet applications. ... – PowerPoint PPT presentation

Number of Views:61
Avg rating:3.0/5.0
Slides: 10
Provided by: MMT91
Category:

less

Transcript and Presenter's Notes

Title: Electronic Signatures: Business and Technology Implications Mass. Software and Internet Council


1
Electronic Signatures Business and Technology
ImplicationsMass. Software and Internet Council
  • Arabella Hallawell

2
Electronic Signature Industry Opportunities
Retail on line account creation B to B/ whole
sale paper reduction?
On line transactions, changes to sales model?
Workflow efficiencies?
On line filing for citizens, businesses. G to G
data sharing, procurement.
Supply chain and internal workflow efficiencies?
On line delivery and distribution of IP and
valuable content
3
Electronic Identity and Signatures
  • External and Internal Constituency Requirements
  • Acceptability
  • Integration with platformsand applications
  • Manageability
  • Registration andmaintenance

Physical Biometrics
Strength of Security
Behavioral Biometrics
Hard Token Dynamic Password
Proximity-Based or Other Hard Tokens
Certificate Digital Signature Smart Card
Dynamic Passwords e.g., SoftID
Certificate Digital Signature
Native Passwords
Cost (Technology, Implementation and Maintenance)
4
Whos Knocking at the Door Really?
High
Medium
Low
Impact of Fraud
Maintain state
Relate to existing physical account
Establish online contract
Relate to online account only
5
Who Gets to See What?
Web Access
Sign-On
Personalized Content
E-Business Applications
Typical Customer
Account
User Profiles
Authorization Server
Premium Customer
6
Preventing Identity Theft
Cookies
Passwords
  • Encryption
  • Bind to IP or machine ID
  • Time to live
  • Security admin
  • Initial registration/ identity verification
    processes
  • Protect password

Tokens
Certificates
  • Smart cards in 2003?
  • USB connector placement?
  • Bluetooth in 2003?
  • Multifunction
  • Frictionless
  • Protect that private key
  • Certification practice statement
  • Certificate policies

7
Intended Span and Overlap Among Public Trust
Suppliers
International industry-based
Local banking cooperative
Local government
Local certificate authority services and software
Regional PTTs
Trust supplier Primary/initial target market
(private) Secondary target market (public)
8
Recommendations
Use an authentication method that is proportional
to the value of the transaction.
Customer education surrounding on line identity
and signature including terms of use. Electronic
signature Statements of Understanding with
supply chain.
Passwords may be weak, but they are not dead yet.
Having an effective, efficient password
management process will be important through
2003.
Define and implement authentication and identity
verification processes for customers,supply chain
and internal. Include web, call center and help
desk.
Trust processes must be integrated into content
management, work flow and document management
processes.
9
Conclusions
By 2003, the electronic identification and
authentication of consumers and citizens will be
a major e-business inhibitor. By 2002
authentication service providers and secure
document exchange and delivery services will be
used by at least 50 of enterprises for B to B
and B to C extranet applications.
Write a Comment
User Comments (0)
About PowerShow.com