SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Page 1




User-Friendly Digital Signatures
           Jon Matonis, CEO, Hush Communications




             Digital Identity Forum
                 October 17 & 18th 2000
                    Marlborough Hotel
                       London, UK



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                          Page 2




                    Overview

• Digital Signatures & the Market
• What are Digital Signatures ?
• Signatures v. Certificates
• Complex PKI Deployments
• The Hush Communications Solution: Technology
• The Hush Communications Solution: Trust
• Contact Hush



                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    1
Page 3




 Digital Signatures & the Market

    • Until recently, digital signatures were not
      considered legally binding within the United
      States;
    • Europe has been quicker to adopt digital
      signatures as a replacement for the traditional
      written signature;
    • Touted as the link between consumers and e-
       commerce, digital signatures are an emerging
       technology poised to generate significantly larger
       transaction sizes.
                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                        Page 4




       What are Digital Signatures ?

• Digital signatures verify with mathematical
  certainty that the message, document, or
  other media received originated from the
  anticipated sender (authentication);
• Digital signatures ensure that what you send
  over the Internet is exactly what is received at
  the other end (integrity);

                                                                 October 23, 00
                                            Copyright 2000 Hush Communications




                                                                                  2
Page 5




       What are Digital Signatures ?

• Digital signatures ensure that someone
  cannot deny that they authorized a particular
  transaction (non-repudiation);
• There are multiple ways to create digital
  signatures, including biometrics, like face
  printing and retina scans, but the most
  common methods involve cryptographic
  algorithms and protocols.
                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                   Page 6




          Signatures v. Certificates

• A digital signature is created by encrypting
  data with a private key.
• A digital certificate is a public key that is
  digitally signed by a Certificate Authority (CA).




                                                            October 23, 00
                                       Copyright 2000 Hush Communications




                                                                             3
Page 7




         Complex PKI Deployments

• Issuing a digital certificate can cost anywhere
  from $5 to $10 per customer.
• The enterprise software needed to manage the
  key, which decrypts and encrypts a message, can
  cost as much as $10 to $100 a person.
• Consumers must pay a periodic fee for the use of
  a digital certificate.
• Most signing devices are linked to a particular PC
  or network.
                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                     Page 8




         Complex PKI Deployments

• The private portion of the digital identity must
  be accessible exclusively to the owner and
  must be used to decrypt and sign data.
• Most PKI solutions require that the user
  possess their private key, which is inherently
  unsafe and reliant upon properly configured
  hardware.

                                                              October 23, 00
                                         Copyright 2000 Hush Communications




                                                                               4
Page 9




         Complex PKI Deployments

• PKI-based digital certificates are inefficient
  and cumbersome where a certificate is
  required to authenticate an individual user.
• Traditional PKI doesn’t have roaming
  capability.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 10




   The Hush Communications Solution

  The Hush Encryption Engine ™ allows end-
  users to store their private key on a Hush
  server. The user doesn’t have to carry a
  private key, smart card, or store the key on a
  hard drive. However, even though Hush
  manages the private key, it is always
  encrypted and is inaccessible to anyone at
  Hush or elsewhere.
                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              5
Page 11




   The Hush Communications Solution

• The Hush Encryption Engine ™ ensures that
  no one but you can access your private key.
• The Engine doesn’t tie you to a single
  computer.
• The Engine is compatible with multiple online
  applications.
• The Engine works with the Java ™
  technology in most common Web browsers.                       October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 12




               Hush Technology

• Hush users generate their private key on their own
  computer first, during signup of installation, and
  encrypt it with a passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 6
Page 13




                Hush Technology

• And then, upload the encrypted private key to one of
  the Hush servers.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 14




                Hush Technology

• After that, whenever a user starts a secure
  communications session, the private key
  automatically is retrieved from the server.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 7
Page 15




                Hush Technology

• And finally, decrypted with the user’s passphrase.




                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                      Page 16




      IMPORTANT SECURITY NOTE

• When the private key resides on a Hush key
  server, it is encrypted with a passphrase.
  That passphrase NEVER leaves the user’s
  computer. At no point is the private key or any
  private data accessible to anyone at Hush.
  Even if Hush were to be subpoenaed, we
  would not be able to learn or reveal your
  private key.
                                                                October 23, 00
                                           Copyright 2000 Hush Communications




                                                                                 8
Page 17




           Hush Digital Signatures

• Hush offers its users the option to digitally
  sign their email and attachments.
• Hush’s digital signature feature is a method
  for the individual user to authenticate their
  online identity.



                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                   Page 18




                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              9
Page 19




                     October 23, 00
Copyright 2000 Hush Communications




                           Page 20




                     October 23, 00
Copyright 2000 Hush Communications




                                      10
Page 21




   Sending a Digitally Signed Message

• First, the data is signed with the user’s private key,
  which the user retrieved at the start of the session,
  when the user logs in with their passphrase.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 22




       Signed Message is Transmitted

• Then, the signed data is sent on to its final
  destination.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    11
Page 23




   Verifying a Digitally Signed Message

• First, the signed data arrives at the recipient’s
  computer.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 24




   Verifying a Digitally Signed Message

• Then, the sender’s public key is automatically
  retrieved from a Hush key server.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    12
Page 25




   Verifying a Digitally Signed Message

• Finally, the public key is used to verify the
  authenticity and integrity of the data.




                                                                   October 23, 00
                                              Copyright 2000 Hush Communications




                                                                         Page 26




    The Hush Communications Solution

• Hush offers Private Label services as a way
  for leading companies to brand their secure
  messaging.
• Trusted Private Label partners control the
  registration and revocation process.
• Digital signatures are enforced and backed
  up by the policies of the Private Label
  partner.                                                         October 23, 00
                                              Copyright 2000 Hush Communications




                                                                                    13
Page 27




 Contact Hush Communications

Worldwide                Sales & Business
Headquarters             Development Office
Hush Communications      Hush Communications
22 Upper Pembroke St.    2825 E. Cottonwood
Dublin 2, Ireland        Parkway, Ste. 500
Phone +353-1-241-0303    Salt Lake City, UT 84121
Fax    +353-1-241-0370   Phone +801-990-3490
alliances@hushmail.com   Fax   +801-990-3111
                         sales@hushmail.com


                                                             October 23, 00
                                        Copyright 2000 Hush Communications




                                                                              14

Mais conteúdo relacionado

Mais procurados

Technical seminar
Technical seminarTechnical seminar
Technical seminar10e11a0545
 
Navigating the World of Cloud Computing
Navigating the World of Cloud ComputingNavigating the World of Cloud Computing
Navigating the World of Cloud ComputingOnline Tech
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchainAniket Singh
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Moldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamahMoldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamahmoldovaictsummit
 
CubeIQ | SID banknotes deposit
CubeIQ | SID banknotes depositCubeIQ | SID banknotes deposit
CubeIQ | SID banknotes depositAndreas Papadedes
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_LightVincent Lebunetel
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 

Mais procurados (19)

Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Navigating the World of Cloud Computing
Navigating the World of Cloud ComputingNavigating the World of Cloud Computing
Navigating the World of Cloud Computing
 
Cyber
CyberCyber
Cyber
 
Presentazione
PresentazionePresentazione
Presentazione
 
It act
It actIt act
It act
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
Moldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamahMoldova kick starting effective digitisation v104 shamah
Moldova kick starting effective digitisation v104 shamah
 
Digital Cash Overview
Digital Cash OverviewDigital Cash Overview
Digital Cash Overview
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
CubeIQ | SID banknotes deposit
CubeIQ | SID banknotes depositCubeIQ | SID banknotes deposit
CubeIQ | SID banknotes deposit
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light20150522_Woobe_Information Kit_Light
20150522_Woobe_Information Kit_Light
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
The use cases of blockchain technology
The use cases of blockchain technologyThe use cases of blockchain technology
The use cases of blockchain technology
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Blockchain presentation v0617
Blockchain presentation v0617Blockchain presentation v0617
Blockchain presentation v0617
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 

Semelhante a User-Friendly Digital Signatures

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)DocuSign
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a ServicePT Datacomm Diangraha
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec ConundrumVirtualTal
 
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Signer.Digital
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfmohammadirfan136964
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 

Semelhante a User-Friendly Digital Signatures (20)

Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Digital Signiture
Digital SignitureDigital Signiture
Digital Signiture
 
Wisekey italia presentation 2012
Wisekey italia presentation 2012Wisekey italia presentation 2012
Wisekey italia presentation 2012
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
De mystifying pki
De mystifying pkiDe mystifying pki
De mystifying pki
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Ppt
PptPpt
Ppt
 
Online bankingsecurity
Online bankingsecurityOnline bankingsecurity
Online bankingsecurity
 
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Mais de Jon Matonis

eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015Jon Matonis
 
Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015Jon Matonis
 
Family Office Forum Zurich 2014
Family Office Forum Zurich 2014Family Office Forum Zurich 2014
Family Office Forum Zurich 2014Jon Matonis
 
Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015Jon Matonis
 
EuroFinance Miami 2015
EuroFinance Miami 2015EuroFinance Miami 2015
EuroFinance Miami 2015Jon Matonis
 
EuroFinance Singapore 2015
EuroFinance Singapore 2015EuroFinance Singapore 2015
EuroFinance Singapore 2015Jon Matonis
 
EuroFinance Budapest 2014
EuroFinance Budapest 2014EuroFinance Budapest 2014
EuroFinance Budapest 2014Jon Matonis
 
State of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in GamblingState of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in GamblingJon Matonis
 
Login 2014 Vilnius
Login 2014 VilniusLogin 2014 Vilnius
Login 2014 VilniusJon Matonis
 
The Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical CurrencyThe Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical CurrencyJon Matonis
 
Bitcoin in the iGaming Environment
Bitcoin in the iGaming EnvironmentBitcoin in the iGaming Environment
Bitcoin in the iGaming EnvironmentJon Matonis
 
Bitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming DigitalBitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming DigitalJon Matonis
 
The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)Jon Matonis
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-MoneyJon Matonis
 
MileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's CurrencyMileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's CurrencyJon Matonis
 
PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5Jon Matonis
 
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11Jon Matonis
 
The Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary UnitThe Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary UnitJon Matonis
 

Mais de Jon Matonis (20)

eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015eCom21: Bitcoin exchanges state of the market 2015
eCom21: Bitcoin exchanges state of the market 2015
 
Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015Booz Allen Hamilton Money Unbound 2015
Booz Allen Hamilton Money Unbound 2015
 
Family Office Forum Zurich 2014
Family Office Forum Zurich 2014Family Office Forum Zurich 2014
Family Office Forum Zurich 2014
 
Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015Society for the Study of Gambling 20 Jan 2015
Society for the Study of Gambling 20 Jan 2015
 
EuroFinance Miami 2015
EuroFinance Miami 2015EuroFinance Miami 2015
EuroFinance Miami 2015
 
EuroFinance Singapore 2015
EuroFinance Singapore 2015EuroFinance Singapore 2015
EuroFinance Singapore 2015
 
EuroFinance Budapest 2014
EuroFinance Budapest 2014EuroFinance Budapest 2014
EuroFinance Budapest 2014
 
Amplify 2015
Amplify 2015Amplify 2015
Amplify 2015
 
State of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in GamblingState of the Market: Bitcoin in Gambling
State of the Market: Bitcoin in Gambling
 
BAFT
BAFTBAFT
BAFT
 
Login 2014 Vilnius
Login 2014 VilniusLogin 2014 Vilnius
Login 2014 Vilnius
 
The Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical CurrencyThe Appeal of a Nonpolitical Currency
The Appeal of a Nonpolitical Currency
 
Bitcoin in the iGaming Environment
Bitcoin in the iGaming EnvironmentBitcoin in the iGaming Environment
Bitcoin in the iGaming Environment
 
Bitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming DigitalBitcoin: Cash Becoming Digital
Bitcoin: Cash Becoming Digital
 
The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)The Evolution of e-Money (DeepSec)
The Evolution of e-Money (DeepSec)
 
The Evolution of E-Money
The Evolution of E-MoneyThe Evolution of E-Money
The Evolution of E-Money
 
MileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's CurrencyMileMoney, Inc. - The People's Currency
MileMoney, Inc. - The People's Currency
 
PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5PayPal Still Dominates Online Payment Industry - ppg 4-5
PayPal Still Dominates Online Payment Industry - ppg 4-5
 
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
PayPal's Recent Efforts Secure Its Leadership Role - ppg 10-11
 
The Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary UnitThe Political Appropriation of the Monetary Unit
The Political Appropriation of the Monetary Unit
 

Último

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

User-Friendly Digital Signatures

  • 1. Page 1 User-Friendly Digital Signatures Jon Matonis, CEO, Hush Communications Digital Identity Forum October 17 & 18th 2000 Marlborough Hotel London, UK October 23, 00 Copyright 2000 Hush Communications Page 2 Overview • Digital Signatures & the Market • What are Digital Signatures ? • Signatures v. Certificates • Complex PKI Deployments • The Hush Communications Solution: Technology • The Hush Communications Solution: Trust • Contact Hush October 23, 00 Copyright 2000 Hush Communications 1
  • 2. Page 3 Digital Signatures & the Market • Until recently, digital signatures were not considered legally binding within the United States; • Europe has been quicker to adopt digital signatures as a replacement for the traditional written signature; • Touted as the link between consumers and e- commerce, digital signatures are an emerging technology poised to generate significantly larger transaction sizes. October 23, 00 Copyright 2000 Hush Communications Page 4 What are Digital Signatures ? • Digital signatures verify with mathematical certainty that the message, document, or other media received originated from the anticipated sender (authentication); • Digital signatures ensure that what you send over the Internet is exactly what is received at the other end (integrity); October 23, 00 Copyright 2000 Hush Communications 2
  • 3. Page 5 What are Digital Signatures ? • Digital signatures ensure that someone cannot deny that they authorized a particular transaction (non-repudiation); • There are multiple ways to create digital signatures, including biometrics, like face printing and retina scans, but the most common methods involve cryptographic algorithms and protocols. October 23, 00 Copyright 2000 Hush Communications Page 6 Signatures v. Certificates • A digital signature is created by encrypting data with a private key. • A digital certificate is a public key that is digitally signed by a Certificate Authority (CA). October 23, 00 Copyright 2000 Hush Communications 3
  • 4. Page 7 Complex PKI Deployments • Issuing a digital certificate can cost anywhere from $5 to $10 per customer. • The enterprise software needed to manage the key, which decrypts and encrypts a message, can cost as much as $10 to $100 a person. • Consumers must pay a periodic fee for the use of a digital certificate. • Most signing devices are linked to a particular PC or network. October 23, 00 Copyright 2000 Hush Communications Page 8 Complex PKI Deployments • The private portion of the digital identity must be accessible exclusively to the owner and must be used to decrypt and sign data. • Most PKI solutions require that the user possess their private key, which is inherently unsafe and reliant upon properly configured hardware. October 23, 00 Copyright 2000 Hush Communications 4
  • 5. Page 9 Complex PKI Deployments • PKI-based digital certificates are inefficient and cumbersome where a certificate is required to authenticate an individual user. • Traditional PKI doesn’t have roaming capability. October 23, 00 Copyright 2000 Hush Communications Page 10 The Hush Communications Solution The Hush Encryption Engine ™ allows end- users to store their private key on a Hush server. The user doesn’t have to carry a private key, smart card, or store the key on a hard drive. However, even though Hush manages the private key, it is always encrypted and is inaccessible to anyone at Hush or elsewhere. October 23, 00 Copyright 2000 Hush Communications 5
  • 6. Page 11 The Hush Communications Solution • The Hush Encryption Engine ™ ensures that no one but you can access your private key. • The Engine doesn’t tie you to a single computer. • The Engine is compatible with multiple online applications. • The Engine works with the Java ™ technology in most common Web browsers. October 23, 00 Copyright 2000 Hush Communications Page 12 Hush Technology • Hush users generate their private key on their own computer first, during signup of installation, and encrypt it with a passphrase. October 23, 00 Copyright 2000 Hush Communications 6
  • 7. Page 13 Hush Technology • And then, upload the encrypted private key to one of the Hush servers. October 23, 00 Copyright 2000 Hush Communications Page 14 Hush Technology • After that, whenever a user starts a secure communications session, the private key automatically is retrieved from the server. October 23, 00 Copyright 2000 Hush Communications 7
  • 8. Page 15 Hush Technology • And finally, decrypted with the user’s passphrase. October 23, 00 Copyright 2000 Hush Communications Page 16 IMPORTANT SECURITY NOTE • When the private key resides on a Hush key server, it is encrypted with a passphrase. That passphrase NEVER leaves the user’s computer. At no point is the private key or any private data accessible to anyone at Hush. Even if Hush were to be subpoenaed, we would not be able to learn or reveal your private key. October 23, 00 Copyright 2000 Hush Communications 8
  • 9. Page 17 Hush Digital Signatures • Hush offers its users the option to digitally sign their email and attachments. • Hush’s digital signature feature is a method for the individual user to authenticate their online identity. October 23, 00 Copyright 2000 Hush Communications Page 18 October 23, 00 Copyright 2000 Hush Communications 9
  • 10. Page 19 October 23, 00 Copyright 2000 Hush Communications Page 20 October 23, 00 Copyright 2000 Hush Communications 10
  • 11. Page 21 Sending a Digitally Signed Message • First, the data is signed with the user’s private key, which the user retrieved at the start of the session, when the user logs in with their passphrase. October 23, 00 Copyright 2000 Hush Communications Page 22 Signed Message is Transmitted • Then, the signed data is sent on to its final destination. October 23, 00 Copyright 2000 Hush Communications 11
  • 12. Page 23 Verifying a Digitally Signed Message • First, the signed data arrives at the recipient’s computer. October 23, 00 Copyright 2000 Hush Communications Page 24 Verifying a Digitally Signed Message • Then, the sender’s public key is automatically retrieved from a Hush key server. October 23, 00 Copyright 2000 Hush Communications 12
  • 13. Page 25 Verifying a Digitally Signed Message • Finally, the public key is used to verify the authenticity and integrity of the data. October 23, 00 Copyright 2000 Hush Communications Page 26 The Hush Communications Solution • Hush offers Private Label services as a way for leading companies to brand their secure messaging. • Trusted Private Label partners control the registration and revocation process. • Digital signatures are enforced and backed up by the policies of the Private Label partner. October 23, 00 Copyright 2000 Hush Communications 13
  • 14. Page 27 Contact Hush Communications Worldwide Sales & Business Headquarters Development Office Hush Communications Hush Communications 22 Upper Pembroke St. 2825 E. Cottonwood Dublin 2, Ireland Parkway, Ste. 500 Phone +353-1-241-0303 Salt Lake City, UT 84121 Fax +353-1-241-0370 Phone +801-990-3490 alliances@hushmail.com Fax +801-990-3111 sales@hushmail.com October 23, 00 Copyright 2000 Hush Communications 14