Spojeni s důvěrou

Spojenie s dôverou

Connected with trust

D. Trust
Certifikačná Autorita a.s.

Spojeni s důvěrou

Spojení s dôverou

Connected with trust

 
Skip Navigation Links


In most cases, electronic communication is nowadays carried out in a way that is not traceable and trustful. The use of electronic signature technologies allows the electronic communication to be safeguarded from the point of view of:

  • credibility of information – the system must ensure that unauthorized persons will not be able to access sensitive information;
  • integrity of information – the system must safeguard information against unauthorized modification;
  • undeniability of information – the system must ensure prevention against the loss of ability to convince a third independent part of its direct responsibility for the sending or receipt of a message.

These elements can be ensured by cryptographic functions and electronic certificates. The use of certificates can be divided into the group of commercial certificates, i.e. their use of defined in a contract entered into between the communicating parties, and the group of qualified certificates, where the support of such a technology is enshrined directly in the applicable legislation.

Where the time factor is essential in electronic communication, it is appropriate to use also the technology of timestamps issued by a “Time Authority”. There are two groups of services here as well – timestamps whose use is defined in a contract entered into between the communicating parties and services of qualified timestamps, the use of which is enshrined directly in the applicable legislation.

Package of complex services .


I.CA has a team of specialists and a number of supporting components that will help you in the building of a complex solution using the PKI.


Examples of Use

With a web interface, it is possible to operate a number of authorized services for clients or suppliers. Also here it is possible to ensure a safe access at several levels, specifically anonymous access, access with a certificate issued by I.CA, and access with the particular certificate of the relevant person.

Using the electronic signature technology (PKI), it is possible to establish complex information systems, which use this technology not only to safeguard external communication but also to safeguard internal communication.

  • Electronic invoicing
  • Ordering of goods and services
  • Entering into contracts
  • Access to personal data
  • Annual statements, statistics

Registration authorities


 
separator
separator