SlideShare une entreprise Scribd logo
1  sur  24
Hosszú távú hiteles archiválás elektronikus aláírás segítségével Krasznay Csaba BME Informatikai Központ
Tartalom ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bevezetés ,[object Object],[object Object],[object Object],[object Object],[object Object]
Törvényi háttér ,[object Object],[object Object],[object Object],[object Object],[object Object]
Elektronikus aláírási szabályzat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Érvényességi idő ,[object Object],[object Object],[object Object],[object Object],[object Object]
Tanúsítványlánc ,[object Object],[object Object],[object Object],[object Object]
Visszavonási lánc ,[object Object],[object Object],[object Object]
Az aláírás hitelességének ellenőrzése ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kivárási idő Aláírás létrehozás ideje Megbízható időpont Visszavonás kérés időpontja A visszavonás kérés feldolgozásának időtartama a HSZ-nél A visszavonás állapot közzétételének időtartama a HSZ-nél Az első visszavonás állapot ellenőrzés Tanúsítvány lánc felépítése és ellenőrzése A második visszavonás állapot ellenőrzés ES-C készítése Tanúsítványok, visszavonási információk tárolása vagy ES-X készítése Kivárási idő
Szabványos aláírás formátumok ,[object Object],[object Object],[object Object],[object Object]
XAdES formátumok ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XAdES formátumok Időbélyegző az ES-C-n Időbélyegző a teljes tanúsítvány és visszavonási referencia Teljes tanúsítvány és visszavonási információ Archív időbé- lyegző BES v. EPES Aláírási szabályzat azonosító (opcionális) Aláírt és nem aláírt attribútumok Digitális aláírás Időbélyező a digitális aláíráson Teljes tanúsítvány és visszavonási referencia ES-T ES-C ES-X ES-A
Problémák hosszútávú archiválás esetén ,[object Object],[object Object],[object Object],[object Object]
Problémák hosszútávú archiválás esetén ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problémák hosszútávú archiválás esetén ,[object Object],[object Object],[object Object],[object Object]
Archiválási szolgáltatók ,[object Object],[object Object],[object Object],[object Object],Piac Szolgáltatás
Az archiválási szolgáltató architektúrája min. XAdES-BES CA TSA Archiválási szolgáltató Dokumentumtár XAdES-A Aláírási szabályzat
XAdES struktúra
XAdES struktúra
Archív időbélyegző ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XAdES-A megvalósítások ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Források ,[object Object],[object Object],[object Object],[object Object]
Köszönöm figyelmüket! ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Plus de Csaba Krasznay

Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Csaba Krasznay
 
Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Csaba Krasznay
 
Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Csaba Krasznay
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Csaba Krasznay
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)Csaba Krasznay
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Csaba Krasznay
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Csaba Krasznay
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Csaba Krasznay
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznayCsaba Krasznay
 
Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Csaba Krasznay
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Csaba Krasznay
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Csaba Krasznay
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Csaba Krasznay
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Csaba Krasznay
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Csaba Krasznay
 
Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Csaba Krasznay
 
Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Csaba Krasznay
 
Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)Csaba Krasznay
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber securityCsaba Krasznay
 

Plus de Csaba Krasznay (19)

Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)Security of the Hungarian electronic government systems (in Hungarian)
Security of the Hungarian electronic government systems (in Hungarian)
 
Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)Countermeasures on the internet (in Hungarian)
Countermeasures on the internet (in Hungarian)
 
Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...Possibilities and results of the usage of electronic signatures in the busine...
Possibilities and results of the usage of electronic signatures in the busine...
 
Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)Security of mobile devices (in Hungarian)
Security of mobile devices (in Hungarian)
 
The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)The ISO 27000 family (in Hungarian)
The ISO 27000 family (in Hungarian)
 
Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)Development of information systems - Common Criteria (in Hungarian)
Development of information systems - Common Criteria (in Hungarian)
 
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...Evaluation laboratories in the Hungarian Information Security Evaluation and ...
Evaluation laboratories in the Hungarian Information Security Evaluation and ...
 
Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)Security of handheld computers (in Hungarian)
Security of handheld computers (in Hungarian)
 
Hacktivity2009 krasznay
Hacktivity2009 krasznayHacktivity2009 krasznay
Hacktivity2009 krasznay
 
Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)Phishing and spam in Hungary and worldwide (in Hungarian)
Phishing and spam in Hungary and worldwide (in Hungarian)
 
Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)Bluetooth security (in Hungarian)
Bluetooth security (in Hungarian)
 
Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)Information security from the other side: Hackers in Hungary (in Hungarian)
Information security from the other side: Hackers in Hungary (in Hungarian)
 
Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)Testing the system: ethical hacking and penetration testing (in Hungarian)
Testing the system: ethical hacking and penetration testing (in Hungarian)
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
 
Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary Developing interoperable e-government solutions in Hungary
Developing interoperable e-government solutions in Hungary
 
Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)Rules of digital archiving (in Hungarian)
Rules of digital archiving (in Hungarian)
 
Wireless network security (in Hungarian)
Wireless network security (in Hungarian)Wireless network security (in Hungarian)
Wireless network security (in Hungarian)
 
Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)Development of a secure e-commerce system based on PKI (in Hungarian)
Development of a secure e-commerce system based on PKI (in Hungarian)
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber security
 

Authentic long-term archiving with electronic signature (in Hungarian)

  • 1. Hosszú távú hiteles archiválás elektronikus aláírás segítségével Krasznay Csaba BME Informatikai Központ
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Kivárási idő Aláírás létrehozás ideje Megbízható időpont Visszavonás kérés időpontja A visszavonás kérés feldolgozásának időtartama a HSZ-nél A visszavonás állapot közzétételének időtartama a HSZ-nél Az első visszavonás állapot ellenőrzés Tanúsítvány lánc felépítése és ellenőrzése A második visszavonás állapot ellenőrzés ES-C készítése Tanúsítványok, visszavonási információk tárolása vagy ES-X készítése Kivárási idő
  • 11.
  • 12.
  • 13. XAdES formátumok Időbélyegző az ES-C-n Időbélyegző a teljes tanúsítvány és visszavonási referencia Teljes tanúsítvány és visszavonási információ Archív időbé- lyegző BES v. EPES Aláírási szabályzat azonosító (opcionális) Aláírt és nem aláírt attribútumok Digitális aláírás Időbélyező a digitális aláíráson Teljes tanúsítvány és visszavonási referencia ES-T ES-C ES-X ES-A
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Az archiválási szolgáltató architektúrája min. XAdES-BES CA TSA Archiválási szolgáltató Dokumentumtár XAdES-A Aláírási szabályzat
  • 21.
  • 22.
  • 23.
  • 24.