Top Banner
1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview
22

1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

Jan 01, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

1

June 16 2004

Richard Guida Stephanie Evans

Johnson & Johnson Johnson & Johnson

Director, WWIS WWIS

SAFE Infrastructure OverviewSAFE Infrastructure Overview

Page 2: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

2

A single electronic credential which: Can be used and accepted across multiple organizations Allows legally binding electronic signatures to be made in countries

around the world Is easy and straightforward for the user to employ Can be obtained from a SAFE-accredited source of the user’s choice

Vendors will have the opportunity to pursue SAFE-accreditation No single supplier controls the marketplace

A set of open standards covering: Software that can make, and validate (check), electronic (digital)

signatures meeting SAFE business rules Ultimately, this capability built in to off-the-shelf products

A trust-based, collaborative community of biopharmaceutical companies and their business/regulatory partners efficiently using electronic processes to conduct business transactions

SAFE GoalsSAFE Goals

Page 3: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

3

What Technology Does the SAFE Credential Employ?

Public Key Technology Widely used for secure electronic and internet transactions

today Based on two keys (large numbers), mathematically linked

One key is kept private, the other is made public Public key appears in a digital certificate – an electronic credential (file)

that links the public key to a person’s identity Private key is kept secret on a hardware device (like a smartcard)

To make a digital signature, the user of the hardware device inserts it into the PC and proves his or her identity to the device (usually done with a passphrase that only the user and the device knows). The private key on the device then makes the digital signature on the

document selected by the user. To validate (check) a digital signature, commercially available

software uses the public key from the digital certificate

What Technology Does the SAFE Credential Employ?What Technology Does the SAFE Credential Employ?

Page 4: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

4

3. Present information (message) to be signed to the user (signer)

Subscriber

1. Authenticate [best practice]

2. Select information to be signed

5. Acknowledge the signature parameters (request for biometric/passphrase/password and legally binding message)

SAFE TransactionMeaning of signing:Approved

Certificate

4. Select Signature parameters

6. Create the digital signature (preserves document integrity)

7. Log transaction

Hash

Data object

SSDigital Signature Certificate

PKCS #7/CMS

Sign

SS

Private Key

The Signing ProcessThe Signing Process

Page 5: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

5

Relying party

1. Receives signed message

4. Log transaction

Equal?Yes = valid

No = invalid

OCSP

Hash

SS Public KeyValidate

Document (as received)Hash

2. Certificate Validation and Digital Signature Verification

Trusted Root CA

IntermediateCA

Subscribers

OCSP

OCSP

3. Acknowledge verification and validation

Log OCSP response

Signature Verification ProcessSignature Verification Process

Page 6: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

6

A special server called a Certification Authority (CA) Analogy: the machine at the Department of Motor Vehicles which creates

your driver’s license

But only after you have proven your identity to a Registration Authority (RA) Analogy: the window at the DMV where you prove who you are before

you can get your driver’s license

An “Issuer” is a vendor, bank, or company that operates a CA and an RA, and issues/supplies credentials to users

SAFE will accredit Issuers so that users wishing to get SAFE credentials (digital certificates) can trust who supplies them

Who Issues SAFE Credentials?Who Issues SAFE Credentials?

Page 7: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

7

Global Trust ChallengeGlobal Trust Challenge

EMEA

FDA

MHLW

MS3

MS4

MS5

The Biopharmaceutical Industry has many communication partners.

The Biopharmaceutical Industry has many communication partners.

CRO 2

Tradepartner

1

Tradepartner

2

CRO 1

Pharma 1

Pharma 2

Pharma 3

Page 8: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

8

Individual Trust Domains

Pharma X

Biopharma Y

FDA

EMEA

=

=

=

Syndicated Bank Trust Network

Regulated Financial Institutions

Issuers

PharmaOutsourced Identity

Credential Provisioning

=

BioPharma Industry Trust

“Bridge”

Any SAFE Accredited CA

==

=

j

The Solution: SAFE Trust Bridge

Page 9: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

9

Two possibilities: Your organization has its own internal or out-sourced CA which can be

cross-certified with the SAFE Bridge CA Your CA issues your employees SAFE-compliant credentials (certificates)

which can then be accepted by other SAFE Members using the SAFE Bridge CA

You purchase a SAFE credential (certificate) from a SAFE-accredited Issuer that is cross-certified with the SAFE Bridge

Either way, your credential is interoperable and accepted within the SAFE community

How Does a User Get a SAFE Credential? How Does a User Get a SAFE Credential?

Page 10: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

10

A CA which establishes “trust connections” among other CAs

Issues certificates to SAFE “Member” CAs

Accepts certificates issued to it by SAFE “Member” CAs

(Analogy: mechanism to permit one DMV to trust drivers’ licenses issued by another DMV – electronically)

Is NOT a “root of trust” – rather, just a conduit of trust

Employs a distributed - NOT a hierarchical – model

Thus, all members are treated as equals

Is product-neutral – employs open standards for certificate issuance and management

Will support digitally signed transactions among Members, and between Members and regulators

What is a Bridge Certification Authority?What is a Bridge Certification Authority?

Page 11: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

11

No – in fact, there is one already in operation (the U.S. Federal Bridge CA) and several others in the planning stages

What is needed is: A Certification Authority

Policy foundation Certificate Policy per RFC 2527/3647 Certification Practices Statement per above

Hardware Server running CA software Server running directory/data base software Server running software to respond to inquiries on certificate status

A governing body (typically called a Policy Authority) An operational body that actually runs it (typically called an Operational

Authority)

Is it Hard to Establish a Bridge CA?Is it Hard to Establish a Bridge CA?

Page 12: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

12

One hardware device per person, which holds your digital identity (this identity cannot be copied)

Ability to make your electronic (“digital”) signature on a document or transaction, meeting SAFE rules so it is legally binding

Ability of any SAFE Member to check (“verify”) your signature

What does SAFE Mean to Users?What does SAFE Mean to Users?

Page 13: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

13

There is plenty of software currently available which performs and validates digital signatures. Two examples (there are many others):

Adobe 6.0 Microsoft Office XP/2003

We are releasing standards for SAFE-compliant signing and validation software

We encourage vendors to adjust their products to meet these standards

In most cases, doing so should not require substantial changes to existing products

For VendorsFor Vendors

Page 14: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

14

DiscussionDiscussion

Page 15: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

15

Back-Up MaterialsBack-Up Materials

Page 16: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

16

SAFE incorporates the STANDARDS from Internet Engineering Task Force (IETF) RFCs Federal Information Processing Standards (FIPS) RSA PKCS

Use of Industry StandardsUse of Industry Standards

Page 17: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

17

• Verification Request (optional)• Verification Response (optional)

Issuer A

SAFE Registration & CertificateManagement Systems

Issuer B

SAFE Registration & CertificateManagement Systems

Member

User

SAFE Signer

SAFE End-EnabledApplication

Member

User

SAFE RelyingParty

SAFE End-EnabledApplication

• SAFE Signature Event

• SAFE Transaction Verification Event

• Verification Request (mandatory)• Verification Response (mandatory)

• Verification Request• Verification Response

• SAFE Signed Transaction

SAFE Entity

SAFE CA Bridge

Alternate Paths

SAFE Role

SAFE Technology

Group

• Cross Certification• CRL Publishing

• Cross Certification• CRL Publishing

• Verification Request (optional)• Verification Response (optional)

Issuer A

SAFE Registration & CertificateManagement Systems

Issuer B

SAFE Registration & CertificateManagement Systems

Member

User

SAFE Signer

SAFE End-EnabledApplication

Member

User

SAFE RelyingParty

SAFE End-EnabledApplication

• SAFE Signature Event

• SAFE Transaction Verification Event

• Verification Request (mandatory)• Verification Response (mandatory)

• Verification Request• Verification Response

• SAFE Signed Transaction

SAFE Entity

SAFE CA Bridge

Alternate Paths

SAFE Role

SAFE Technology

Group

• Cross Certification• CRL Publishing

• Cross Certification• CRL Publishing

Applications need to be SAFE EnabledApplications need to be SAFE Enabled

Page 18: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

18

B

Certification Authority

End Entity

Certificate

Cross Certificate Relying parties are colored the same as their trust anchor.

Relying parties are colored the same as their trust anchor.

SAFE Bridge CASAFE Bridge CA

Page 19: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

19

Issuer A Issuer B

User A App User B App1

2

4

3

5

Bridge CACRL PublishingCRL Publishing

Issuer A Issuer B

User A App User B App1

5

2

3

4

1b

Bridge CACRL PublishingCRL Publishing

Issuer A Issuer B

User A App User B App1

2

3

Bridge CACRL PublishingCRL Publishing

Recommend for SAFE Phase 1 development Recommend on-hold for subsequent SAFE Phase development

Recommend on-hold for subsequent SAFE Phase development

SAFE Signature Verification OptionsSAFE Signature Verification Options

Page 20: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

20

Issuer A Issuer B

User A App User B App1. User A sends signed message to relying party B

2. User B validates certificate of User A by sending a signed request to it’s Issuer (CA)

4. Sends a timestamp signed response informing User B certificate is valid

3. Issuer B request for validation of User A certificate

5. Informs user B certificate is valid

Bridge CA

Signature Verification Option 1: Issuer Performed

CRL PublishingCRL Publishing

Recommend for SAFE Phase 1 development

SAFE Signature Verification Option 1: Issuer PerformedSAFE Signature Verification Option 1: Issuer Performed

Page 21: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

21

Issuer A Issuer B

User A App User B App1. User A sends signed message to relying party B

5. Sends timestamped signed response informing User B certificate is valid

2. User B validates certificate of User A by sending a signed request to it’s Issuer (CA)

3. Issuer A validated User B certificate

4. Sends timestamped signed response validating user B

Signature Verification Option 2: Member Performed

1b. User B validates that Issuer A is contractually bound into the system

Bridge CACRL PublishingCRL Publishing

Recommend on-hold for subsequent SAFE Phase development

SAFE Signature Verification Option 2: Member PerformedSAFE Signature Verification Option 2: Member Performed

Page 22: 1 June 16 2004 Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.

22

Signature Verification Option 3: SAFE Entity Performed

Issuer A Issuer B

User A App User B App

Bridge CACRL PublishingCRL Publishing

1. User A sends signed message to relying party B

2. User B validates certificate of User A by sending a signed request to SAFE Bridge CA

3. SAFE informs user B that certificate is valid based on current SAFE & Issuer CRLs

Recommend on-hold for subsequent SAFE Phase development

SAFE Signature Verification Option 3: SAFE Entity PerformedSAFE Signature Verification Option 3: SAFE Entity Performed