News from Digital Certification Centre

Published: 14 February 2005 y., Monday
On January 27, 2005 JSC “Skaitmeninio sertifikavimo centras” (Digital Certification Centre) presented an application for IVPC to register a company providing qualified certification services. The director of the company Mudrikas Dadasovas tells about the future plans. Beginning our work we understood, that technology of digital signature is not an object but a means of solution for concrete e-business and e-government projects. As the first Lithuanian company providing digital signature services CC plans to participate in the digital signature infrastructure creation process in Lithuania. CC prepared a popular article series where the possibilities of digital signature obtaining, use, checking and implementation of different processes will be explained. The infrastructure of digital signature is composed of: certification service, registration service, users, e-service providers or trusted sides. CC is ready to cooperate with e-service providers and with service recipients. Digital certificates let e-process users legally sign e-documents and identify themselves; also the e-service providers be the e-process participators identity and check the signature’s originality. If a user wants to sign the document legally he needs to have a digital certificate. The digital certificate can be obtained by these means: directly from CC registration service (CC RS) when a user presents all necessary documents or from a registration service authorized by CC where user personal information is verified. For example, telecommunication operators or banks can serve clients by giving them digital certificates. CC supplies the registration service by legal and technologic means, instructs the service personnel. Irrespective of registration service type which clients signed agreements with, digital certificates are issued by CC certification service which has the proper organization and technical resources. The certification centre has to strict requirements, and possesses high intellectual and material resources. According to EU and Lithuanian law anybody can provide digital certification services, but reliable certificates can only be obtained by companies which have a status of a qualified service provider. Digital certificates are created on computer storage devices, for example, on computer hard discs, special chip cards, mobile phones, etc. Where should one keep the personal certificate? It depends on the use of certificate (e-mail signing, business documents and agreement signing, to sign in to computer resources, etc.). Certificates kept on PC hard disc have lowest degree of protection; therefore use of such certificates is not recommended. Certificates can be qualified or nonqualified. The qualified certificate means that it was concluded by a qualified service provider. The answer to question if certificate is qualified can be given by e-service provider. For example, if a governmental institution requires the qualified certificate to sign in to its database it means that all possible users have to present qualified certificates. The process to obtain the certificate is the following: a user applies to DCC registration service to issue a certificate. And if there are no obstacles they are handed over to CC to conclude the certification service. The certificate is given back by the CC to the registration service which presents the certificate to the user. Therefore only registration service cooperates with users. We described the digital signature obtaining process in this article. We will describe the usage of certification in the second one. Digital Certification Centre will answer your questions. Please send the questions to info@ssc.lt. More information about Digital Certification Centre you can find at the web site www.ssc.lt. The 14th annual RSA Conference will be held at the Moscone Center in San Francisco, California, February 14-19, 2005. The RSA Conference is the largest and most comprehensive event created for information security professionals - it delivers more learning, networking and product demonstrations than any other security gathering. Attendees will meet the best and the brightest in the information security industry, both decision makers and technology luminaries. Don't miss your opportunity to learn fresh approaches and develop innovative strategies and tactics to defeat today's biggest information security threats. Leaders of the following companies will make the reports: CISCO (John Chambers), Microsoft (Bill Gates), Symantec (John Thompson), RSA Security (Art Coviello), Sun Microsystems (John Loiacano), VeriSign (Scratton Sclavos), etc. “Computer protection is a complex problem and its solution requires efforts from specialists of different fields. Therefore this is a unique possibility to become acquainted with this industry basic development tendencies and to communicate with concrete program and technical products providers”, says JSC “SSC” representative Mudrikas Dadasovas. “It is important for us to participate in conference debates, and learn new opportunities of world experience. We will have many individual meetings which will let our company improve common cause cooperation. We won’t demonstrate our production during the conference, but the meeting will help us to introduce the partners to our first product: a program “JUSTA – light” created for all digital documents signature. The program is for be assigned for usual and personal users. People can use it without special knowledge. It is important that “JUSTA light” can “speak” a client language; there are Lithuanian and English program versions”.
Šaltinis: 2005.rsaconference.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Motorola's Moto 360 smartwatch expected to be released in July

Moto 360, Motorola's upcoming entry into the smartwatch industry, is rumored to be preparing for a July release. more »

Choreographer from Unisys helps organisations better manage their Cloud resources

Unisys Corporation has announced Choreographer, a cloud management platform designed to direct and optimise key IT services and processes. Choreographer automates the lifecycle management of data centre and public infrastructure resources to help more efficiently deploy applications in both private and public cloud environments. more »

The world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona

This February 24-27, the world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona. more »

Unisys Announces Third-Quarter 2013 Financial Results

Unisys Corporation reported a third-quarter 2013 net loss of $11.6 million, or a loss of 26 cents per diluted share, which included $22.6 million of pension expense. In the third quarter of 2012, the company reported a net loss of $12.4 million, or a loss of 28 cents per diluted share, which included $28.9 million of pension expense and $23.1 million of debt reduction charges. more »

Akamai and Cisco Working Together to Optimize Application Delivery for Enterprise Branch Offices over Hybrid WAN

Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced plans for future integration of Akamai Unified Performance technology into the Cisco® ISR-AX series of routers. more »

Xbox One to welcome indie games makters

Microsoft is to allow independent games developers to self-publish on its Xbox One games console. "Indies" will be able to create their own games, publish to the Xbox when they like, and set their own pricing, the computer giant has confirmed. more »

Nokia Lumia 625 packs 4G and 4.7-inch screen

Nokia has unveiled the Lumia 625, the largest Lumia Windows Phone yet, with a 4.7-inch screen and 4G. more »

Unisys to Offer Unisys Stealth Solution for Amazon Web Services

Unisys Corporation (NYSE: UIS) announced the availability of its Unisys Stealth Solution for Amazon Web Services (AWS) designed to enhance security for clients moving data into the cloud. more »

Open IPTV Forum publishes HTML5 profile for Connected TVs

The Open IPTV Forum (OIPF) has published a profile of HTML5, CSS, DOM3 and other related web technologies aimed at connected TV services and devices that implement a browser-based application environment. more »

Most Americans Worry about Data Breaches but Disagree about the Need for Private Companies to Notify Government about Cyber Attacks

According to new research conducted by Unisys Corporation (NYSE: UIS), a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should require private businesses to share cyber attack information with the government. more »