+ All Categories
Home > Documents > 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE...

1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE...

Date post: 01-Jan-2016
Category:
Upload: catherine-parrish
View: 213 times
Download: 0 times
Share this document with a friend
22
1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview
Transcript

1

June 16 2004

Richard Guida Stephanie Evans

Johnson & Johnson Johnson & Johnson

Director, WWIS WWIS

SAFE Infrastructure OverviewSAFE Infrastructure Overview

2

A single electronic credential which: Can be used and accepted across multiple organizations Allows legally binding electronic signatures to be made in countries

around the world Is easy and straightforward for the user to employ Can be obtained from a SAFE-accredited source of the user’s choice

Vendors will have the opportunity to pursue SAFE-accreditation No single supplier controls the marketplace

A set of open standards covering: Software that can make, and validate (check), electronic (digital)

signatures meeting SAFE business rules Ultimately, this capability built in to off-the-shelf products

A trust-based, collaborative community of biopharmaceutical companies and their business/regulatory partners efficiently using electronic processes to conduct business transactions

SAFE GoalsSAFE Goals

3

What Technology Does the SAFE Credential Employ?

Public Key Technology Widely used for secure electronic and internet transactions

today Based on two keys (large numbers), mathematically linked

One key is kept private, the other is made public Public key appears in a digital certificate – an electronic credential (file)

that links the public key to a person’s identity Private key is kept secret on a hardware device (like a smartcard)

To make a digital signature, the user of the hardware device inserts it into the PC and proves his or her identity to the device (usually done with a passphrase that only the user and the device knows). The private key on the device then makes the digital signature on the

document selected by the user. To validate (check) a digital signature, commercially available

software uses the public key from the digital certificate

What Technology Does the SAFE Credential Employ?What Technology Does the SAFE Credential Employ?

4

3. Present information (message) to be signed to the user (signer)

Subscriber

1. Authenticate [best practice]

2. Select information to be signed

5. Acknowledge the signature parameters (request for biometric/passphrase/password and legally binding message)

SAFE TransactionMeaning of signing:Approved

Certificate

4. Select Signature parameters

6. Create the digital signature (preserves document integrity)

7. Log transaction

Hash

Data object

SSDigital Signature Certificate

PKCS #7/CMS

Sign

SS

Private Key

The Signing ProcessThe Signing Process

5

Relying party

1. Receives signed message

4. Log transaction

Equal?Yes = valid

No = invalid

OCSP

Hash

SS Public KeyValidate

Document (as received)Hash

2. Certificate Validation and Digital Signature Verification

Trusted Root CA

IntermediateCA

Subscribers

OCSP

OCSP

3. Acknowledge verification and validation

Log OCSP response

Signature Verification ProcessSignature Verification Process

6

A special server called a Certification Authority (CA) Analogy: the machine at the Department of Motor Vehicles which creates

your driver’s license

But only after you have proven your identity to a Registration Authority (RA) Analogy: the window at the DMV where you prove who you are before

you can get your driver’s license

An “Issuer” is a vendor, bank, or company that operates a CA and an RA, and issues/supplies credentials to users

SAFE will accredit Issuers so that users wishing to get SAFE credentials (digital certificates) can trust who supplies them

Who Issues SAFE Credentials?Who Issues SAFE Credentials?

7

Global Trust ChallengeGlobal Trust Challenge

EMEA

FDA

MHLW

MS3

MS4

MS5

The Biopharmaceutical Industry has many communication partners.

The Biopharmaceutical Industry has many communication partners.

CRO 2

Tradepartner

1

Tradepartner

2

CRO 1

Pharma 1

Pharma 2

Pharma 3

8

Individual Trust Domains

Pharma X

Biopharma Y

FDA

EMEA

=

=

=

Syndicated Bank Trust Network

Regulated Financial Institutions

Issuers

PharmaOutsourced Identity

Credential Provisioning

=

BioPharma Industry Trust

“Bridge”

Any SAFE Accredited CA

==

=

j

The Solution: SAFE Trust Bridge

9

Two possibilities: Your organization has its own internal or out-sourced CA which can be

cross-certified with the SAFE Bridge CA Your CA issues your employees SAFE-compliant credentials (certificates)

which can then be accepted by other SAFE Members using the SAFE Bridge CA

You purchase a SAFE credential (certificate) from a SAFE-accredited Issuer that is cross-certified with the SAFE Bridge

Either way, your credential is interoperable and accepted within the SAFE community

How Does a User Get a SAFE Credential? How Does a User Get a SAFE Credential?

10

A CA which establishes “trust connections” among other CAs

Issues certificates to SAFE “Member” CAs

Accepts certificates issued to it by SAFE “Member” CAs

(Analogy: mechanism to permit one DMV to trust drivers’ licenses issued by another DMV – electronically)

Is NOT a “root of trust” – rather, just a conduit of trust

Employs a distributed - NOT a hierarchical – model

Thus, all members are treated as equals

Is product-neutral – employs open standards for certificate issuance and management

Will support digitally signed transactions among Members, and between Members and regulators

What is a Bridge Certification Authority?What is a Bridge Certification Authority?

11

No – in fact, there is one already in operation (the U.S. Federal Bridge CA) and several others in the planning stages

What is needed is: A Certification Authority

Policy foundation Certificate Policy per RFC 2527/3647 Certification Practices Statement per above

Hardware Server running CA software Server running directory/data base software Server running software to respond to inquiries on certificate status

A governing body (typically called a Policy Authority) An operational body that actually runs it (typically called an Operational

Authority)

Is it Hard to Establish a Bridge CA?Is it Hard to Establish a Bridge CA?

12

One hardware device per person, which holds your digital identity (this identity cannot be copied)

Ability to make your electronic (“digital”) signature on a document or transaction, meeting SAFE rules so it is legally binding

Ability of any SAFE Member to check (“verify”) your signature

What does SAFE Mean to Users?What does SAFE Mean to Users?

13

There is plenty of software currently available which performs and validates digital signatures. Two examples (there are many others):

Adobe 6.0 Microsoft Office XP/2003

We are releasing standards for SAFE-compliant signing and validation software

We encourage vendors to adjust their products to meet these standards

In most cases, doing so should not require substantial changes to existing products

For VendorsFor Vendors

14

DiscussionDiscussion

15

Back-Up MaterialsBack-Up Materials

16

SAFE incorporates the STANDARDS from Internet Engineering Task Force (IETF) RFCs Federal Information Processing Standards (FIPS) RSA PKCS

Use of Industry StandardsUse of Industry Standards

17

• Verification Request (optional)• Verification Response (optional)

Issuer A

SAFE Registration & CertificateManagement Systems

Issuer B

SAFE Registration & CertificateManagement Systems

Member

User

SAFE Signer

SAFE End-EnabledApplication

Member

User

SAFE RelyingParty

SAFE End-EnabledApplication

• SAFE Signature Event

• SAFE Transaction Verification Event

• Verification Request (mandatory)• Verification Response (mandatory)

• Verification Request• Verification Response

• SAFE Signed Transaction

SAFE Entity

SAFE CA Bridge

Alternate Paths

SAFE Role

SAFE Technology

Group

• Cross Certification• CRL Publishing

• Cross Certification• CRL Publishing

• Verification Request (optional)• Verification Response (optional)

Issuer A

SAFE Registration & CertificateManagement Systems

Issuer B

SAFE Registration & CertificateManagement Systems

Member

User

SAFE Signer

SAFE End-EnabledApplication

Member

User

SAFE RelyingParty

SAFE End-EnabledApplication

• SAFE Signature Event

• SAFE Transaction Verification Event

• Verification Request (mandatory)• Verification Response (mandatory)

• Verification Request• Verification Response

• SAFE Signed Transaction

SAFE Entity

SAFE CA Bridge

Alternate Paths

SAFE Role

SAFE Technology

Group

• Cross Certification• CRL Publishing

• Cross Certification• CRL Publishing

Applications need to be SAFE EnabledApplications need to be SAFE Enabled

18

B

Certification Authority

End Entity

Certificate

Cross Certificate Relying parties are colored the same as their trust anchor.

Relying parties are colored the same as their trust anchor.

SAFE Bridge CASAFE Bridge CA

19

Issuer A Issuer B

User A App User B App1

2

4

3

5

Bridge CACRL PublishingCRL Publishing

Issuer A Issuer B

User A App User B App1

5

2

3

4

1b

Bridge CACRL PublishingCRL Publishing

Issuer A Issuer B

User A App User B App1

2

3

Bridge CACRL PublishingCRL Publishing

Recommend for SAFE Phase 1 development Recommend on-hold for subsequent SAFE Phase development

Recommend on-hold for subsequent SAFE Phase development

SAFE Signature Verification OptionsSAFE Signature Verification Options

20

Issuer A Issuer B

User A App User B App1. User A sends signed message to relying party B

2. User B validates certificate of User A by sending a signed request to it’s Issuer (CA)

4. Sends a timestamp signed response informing User B certificate is valid

3. Issuer B request for validation of User A certificate

5. Informs user B certificate is valid

Bridge CA

Signature Verification Option 1: Issuer Performed

CRL PublishingCRL Publishing

Recommend for SAFE Phase 1 development

SAFE Signature Verification Option 1: Issuer PerformedSAFE Signature Verification Option 1: Issuer Performed

21

Issuer A Issuer B

User A App User B App1. User A sends signed message to relying party B

5. Sends timestamped signed response informing User B certificate is valid

2. User B validates certificate of User A by sending a signed request to it’s Issuer (CA)

3. Issuer A validated User B certificate

4. Sends timestamped signed response validating user B

Signature Verification Option 2: Member Performed

1b. User B validates that Issuer A is contractually bound into the system

Bridge CACRL PublishingCRL Publishing

Recommend on-hold for subsequent SAFE Phase development

SAFE Signature Verification Option 2: Member PerformedSAFE Signature Verification Option 2: Member Performed

22

Signature Verification Option 3: SAFE Entity Performed

Issuer A Issuer B

User A App User B App

Bridge CACRL PublishingCRL Publishing

1. User A sends signed message to relying party B

2. User B validates certificate of User A by sending a signed request to SAFE Bridge CA

3. SAFE informs user B that certificate is valid based on current SAFE & Issuer CRLs

Recommend on-hold for subsequent SAFE Phase development

SAFE Signature Verification Option 3: SAFE Entity PerformedSAFE Signature Verification Option 3: SAFE Entity Performed


Recommended