SlideShare a Scribd company logo
1 of 16
Download to read offline
Telecommunications, Information,
Media & Electronics
Paving the Way to a Digital Europe
Digital Signatures
Content
Introduction	3
Digital Signatures – Authenticity and Integrity of Data Provides a High Level of Security	 4
Benefits Include Decreased Costs and Greater Efficiency	 7
Several Challenges Still Need to be Overcome	 8
New Legislation will Further Promote the Use of E-signatures	 9
The Digital Signature Market is Highly Fragmented and Dynamic	 10
Use Cases Provide Insight into the Practical Application of Digital Signatures	 12
Credit Agricole Consumer Finance Case Study	 13
Conclusion	 14
Authors:
Nicolai Schaettgen
Principal
TIME, Austria
schaettgen.nicolai@adlittle.com
Didier Levy
Director
TIME, France
levy.didier@adlittle.com
Sorana Socol
Business Analyst
TIME, Austria
socol.sorana@adlittle.com
Julien Duvaud-Schelnast
Manager
TIME, France
duvaud-schelnast.julien@adlittle.com
3
Digital signature solutions are quickly replacing paper-based signatures and have
the potential to dominate signature-related processes.The primary benefits of this
technology include increased efficiency, lower costs and increased customer
satisfaction.
Processes that still require a handwritten signature slow down turnaround time,
increase complexity in terms of archiving, and also raise environmental issues
with regards to paper usage. Companies are therefore increasingly adopting
digital signature solutions to address those challenges.
The financial services industry is the pioneer in the adoption and development of
digital signature solutions, and we expect other industries, such as
telecommunica­tion, commerce, utilities, notaries and healthcare, to follow soon
as the benefits of this new technology, namely increased efficiency, lower costs
and increased customer satisfaction, are not restricted to any industry. While
offering clear advantages, digital signature solutions still need to overcome some
challenges, such as the need to adapt existing systems and processes to the new
technology, concern about acceptance by business partners and the perceived
high cost.
The European Union is currently finalizing regulation, which will increase the legal
value of advanced electronic signatures and remote electronic signing services by
offering the possibility to generate a qualified digital signature using a remote
signing system.The regulation is expected to be enacted in early July 2014.This
development is expected to serve as an example for other markets on how to
approach digital signatures from a regulatory standpoint.
This report is based on Arthur D. Little’s survey of 50 market experts in Europe, as
well as comprehensive secondary market research. In this report, we provide an
overview of the digital signature technology, its current and potential market, as
well as the benefits and challenges it brings. We also present examples of
practical applications of digital signature solutions.
Introduction
Digital Signatures
4
Digital signature solutions are quickly replacing paper-based
signatures and have the potential to dominate signature-related
processes.The primary benefits of this technology include
increased efficiency, lower costs and increased customer
satisfaction. Digital signatures need to be clearly distinguished
from ordinary authentication processes. While authentication is
only used to verify the identities of end-users, digital signatures
also ensure the integrity of data. A combination of these two
security factors is critical for many business transactions,
especially those involving sensitive and confidential data.
Digital signatures are a sub-category of electronic signatures.
While an digital signature can be any kind of data attached to
a document, such as a written name below an email, a digital
signature is based on a mathematical process of protecting
the document.There are two major types of digital signatures,
differentiable only by how securely the authentication has been
processed:
nn 	Qualified digital signature (QES) is a signature that is
created with a secure signature-creation device, other than
the device where the document is actually signed, which
provides very high security;
nn 	Advanced digital signature (AES) is a digital signature
where the signature could be created on the same device
where the document is signed, which is somewhat less
secure than QES
A digital signature involves three processes: the signing process,
the authentication process and the process of ensuring the
integrity of data.The process of creating a digital signature is the
same, whether internally or externally managed.
nn 	The signing process starts by providing an end-user with
a document that needs to be signed. In order to be sure
that the correct person signs the contract, the end-user’s
identity is verified by multiple factor authentication, such as a
PIN, password and sequence-based token codes. Once the
identity is verified, the signer receives a certificate proving
his identity and providing him with a pair of keys: a private
key (known only to the signer) and a public key (known to
the public).These keys are necessary to sign a document
and to verify the identity of the signer. Once the certificate
is issued, a unique mathematical code is created out of the
document.This mathematical code is then encrypted with
the private key (signing) and can only be decrypted with
the corresponding public key (verification of signature).The
document, together with the encrypted mathematical code,
is then sent to the recipient.
nn 	In order to ensure authenticity, the recipient with access
to the public key can decrypt the mathematical code and is
therefore able to ensure authenticity.The public key works
for decryption only if the document was signed with the
corresponding private key already confirming the identity of
the signer.
nn 	The integrity of data is ensured through a mathematical
code, which is visible to the receiver after the decryption.
To verify that the document has not been changed by
any unauthorized person, the receiver calculates his own
mathematical code out of the document. If both codes
match, the integrity of the data is ensured; if the document
had been changed in transition, the receiver’s calculation
would give a different code.
Digital Signatures
Authenticity and Integrity of Data Provides a High Level of Security
Figure 1: The Digital Signature signing and verification
processes
Source: Arthur D. Little
Hash
function
10100101011
Hash value
Encryption
with
private key
10100101011
10100101011
Digitally signed data
Verification process
10100101011
Hash
function
Decryption
with
public key
10100101011 10100101011=
?
The digital signature is valid only if
the hash values are equal.
Signing process
Digital Signatures
5
Figure 1 illustrates the signing and verification process on the
basis of the RSA (Rivest, Shamir and Adleman) cryptosystem
technology, which is the most widely used encryption
technology.
The encryption process described above provides the foundation
for the high security and the legal validity of this technology.The
mathematical encryption combined with a high quality certificate
ensures the integrity and authenticity of the digital signature.
The resulting advanced digital signature is covered under EU law
and therefore legally valid.
Any process not encompassing these security measures are
not regarded as secure or legally valid. Remote and face-to-face
transactions should therefore be based on the above procedure
of securing data. For example, a handwritten digital signature on
a signature pad without a digital signature created is not legally
valid in court decisions, based on the precedent legal case from
June 2012 in Germany1
. Other commonly used techniques
encompass the recognition of biometric data, such as the
speed or pressure of the signature, in order to authenticate the
signatory.This technology is certainly more secure than a simple
handwritten signature on a signature pad, but it is not covered
by EU law or most national laws and provides therefore no legal
validity.
There are two major ways to offer digital signature solutions
to end-users: an externally managed process and an internally
managed process. Although both have advantages and
disadvantages, based on analysis of market trends, Arthur D.
Little believes that the externally managed process will be the
solution of the future.
Externally managed process (external Public-Key-
Infrastructure or PKI)
During the externally managed process, an external company
provides the certificates needed for the digital signature.The
third party is responsible for providing one-time certificates to
employees and / or customers of the company after they have
been authenticated. With a fully externally managed process,
companies do not need to invest in set-up and maintenance,
which results in a lower overall cost of implementation.
Preferably, the external service provider should offer a full cloud
solution, the primary advantage of which is that the certificates
are not stored on any SSCD (Secure Signature Creation Device
or token), but in the cloud and can therefore be used on any
device. Furthermore, no specific Software as a Service (SaaS)
has to be installed, increasing the level of trust and convenience
1	 http://www.justiz.bayern.de/gericht/olg/m/presse/archiv/2012/03561/
for the customer. Studies have shown that customers who are
asked to install software when digitally signing are more likely
to cancel the process. For customers, the strongest incentive is
convenience. Digital signatures are a much easier way to sign
for a document compared to plugging an e-ID card into a PC and
even to the traditional handwritten signature.The cloud enables
companies also to offer multi-channel signatures (e.g. one
signature from home, the other from mobile phone). As mobile
signing from a tablet or smart phone becomes more popular,
a cloud-managed service will be the preferred technology.This
was also confirmed in the interviews Arthur D. Little conducted,
in which one market player responded, “Why should we ask
customers to carry always a token or smart-card reader with
them?”
It is important to mention here that this type of concept makes
the most sense if the third party is a trusted one, such as on
the EU trusted list.This will not only raise the overall level of
trust, but the certificates provided by a trusted third party are
recognized virtually worldwide, which means that the root
certificate, a certificate that is verified as trusted, is already
installed in most browsers and operating systems and no error
message will appear as with the internally managed process.
With cloud solutions, there is also the possibility to perform the
signature with an SSCD or a smart card. Here the cloud can be
used to securely archive the digitally signed documents.
Internally managed process (internal PKI)
The certificates needed for the digital signature are established
and provided internally by the company offering these solutions
to employees or customers directly. Certificates are not one-
time certificates, but can be reused, as they are stored on
specific badges, such as a token, smart cards, etc.
The concept requires an infrastructure that securely manages
identities and corresponding certificates.The process of
implementing a PKI involves an investment into hardware,
software, and training for employees, and is therefore rather
applicable for larger corporations with the corresponding
knowledge and resources. A major drawback of the internal PKI
concept is that the certificates are in most cases not trusted by
browsers and operating systems, unless the company is on the
EU trusted list.
Depending on the resources available and the level of trust and
control required, each company has to weigh which solution
suits it best. However, there are already indications that
solutions where additional external devices are needed to create
digital signatures will not be popular with the general public.
15 European countries deployed electronic identity cards (eID)
Digital Signatures
6
containing credentials for online authentication, with a majority
also offering an optional digital signature function.To be able to
make use of this digital signature function, a card reader for the
eID needs to be bought, further complicating this concept.
The potential of this solution could, however, be improved with
NFC (Near Field Communication) technology enabling the usage
of the digital signature with eIDs without a card reader, such
as with an NFC smart phone. Although the ability to sign using
a smart phone would guarantee a higher level of mobility, it is
expected that full cloud solutions not requiring any card or card
reader will dominate the future market for digital signatures, as
the level of convenience provided will be the decisive factor in
the choice of solution.
Digital Signatures
7
Benefits Include Decreased Costs and
Greater Efficiency
Digital signatures can be implemented in a variety of areas as
companies can use digital signatures for their internal processes
or communication with business partners and customers.
Governments are also an important category of customers for
this technology, as they are increasingly required to implement
leaner and cost-minimizing processes.
Many companies and governments have already realized the
potential of this technology. A fully digital process of signing and
sending documents decreases work hours and reduces cost in
paper and transport. Arthur D. Little’s survey and further analysis
confirmed that the immediate adoption of the technology has
the potential to create a sustainable competitive advantage
independent of the industry in which a company operates.
According to the results of Arthur D. Little’s survey, the main
argument for adopting the technology is to improve efficiency,
leading to the reduction of costs, and to increase to the speed
of the overall business.The use of digital signatures decreases
costs by reducing processing costs, such as scanning,
recording, archiving, printing and mailing, and reduces resource
expense (less process cycle time results in lower personnel
expenses). Business processes are also made more efficient
by increasing the overall agility of enterprises (reduced process
cycles, speed of closing business) and through the real time
tracking and coordination of business.
Besides efficiency considerations, adopting digital signature
solutions portray a progressive image of both the user and the
provider of such technologies. Also digital signature solutions
have the potential to increase customer convenience. For
example, a bank can offer its customers multi-channel solutions
to sign a loan agreement.
Although industry experts taking part in the survey did not
regard increased security as a major benefit of the technology,
digital signatures provide a higher level of security than
traditional methods of sending documents, when implemented
appropriately with cryptographic procedures with qualified
certificates:
nn 	The integrity of data can be ensured as counterfeiting
is virtually impossible, while a paper document can be
modified after being signed by an unauthorized person,
nn 	The probability of losing a digital copy is much lower
compared to paper-based documents,
nn 	All types of data, such as photos or audio files, can be
digitally signed, which protects the copyright of these
materials,
nn 	A timestamp can be attached to the digital signature,
ensuring that the document was signed on a specific date.
What do you see as the main benefits expected of deploying Digital Signature solutions?
(1-highest; 6-lowest)
Figure 2: The major benefits of Digital Signatures
Note: All numbers represent average values
2,7
2,7
2,3
2,3
2,1
Increased security
Increased convenience
Improved commercial efficiency
Time saving (turnaround time)
Cost saving (paper, storage, etc.)
Digital Signatures
8
Despite the potential of the technology, the implementation
of digital signature solutions also brings along challenges. A
majority of companies have systems and processes designed
around traditional methods of contractual communication. From
an employee’s desk to the archiving of signed documents, the
adaption of existing applications or systems was regarded as
a major issue in the interviews. Companies and institutions
interested in adopting the technology are therefore highly
dependent on trusted, easy-to-implement and convenient
solutions that do not increase the complexity of workflows.
Suppliers able to offer this important mixture of characteristics
will likely have substantial competitive advantage in the market
for digital signature.
Furthermore, there is still an issue with the acceptance of
business partners/customers. From the survey, however, it was
clear that this acceptance is strongly dependent on the solutions
offered to customers, meaning that a broad range of use cases
guaranteeing ease of usage will raise the acceptance of natural
and business partners.
There was also the impression among respondents that
implementing digital signature solutions will incur a high cost
of investment.This argument is applicable in the short-term,
but reduced costs offset the cost of investment generally in a
very short time.The cost of a particular solution depends on
the type of implementation. Cloud solutions result in lower
implementation cost.The overall cost, however, depends on the
solution’s pricing model and on the frequency of usage.
Certified email could present a risk to digital
signatures
Certified email is a service that is also aiming to ensure a
secure transfer of data between sender and recipient by
enabling emails to be encrypted by the sender and decrypted
by the receiver. In order to do so, the sender and the receiver
need to have a certified email account with a certified email
provider and software that is able to encrypt and decrypt
emails. If authenticity of the sender plays an important role in
the transaction at hand, the certified email can also be digitally
signed (with a qualified digital signature).
A major security issue with certified email is that it is not based
on an end-to-end encryption process, meaning that every email
that was encrypted by the sender is decrypted by both certified
email providers (email could be read or modified), representing
a security issue that could be utilized by unauthorized parties.
There is a possibility to enable end-to-end encryption, but only
with additional encryption software.
Compared to classic digital signature solutions, email has
security and convenience disadvantages as the standard model
is not based on end-to-end encryption and because both the
sender and the receiver must have a certified email account.
Several Challenges Still Need to be
Overcome
3,3
3,0
2,8
2,1
2,8Investment / implementation cost
B2C, B2B acceptance
Adaption of existing
applications or systems
Security issues
Legal issues
Figure 3: The primary challenges of Digital Signatures
What do you see as the main challenges with regards to Digital Signature solutions?
(1-highest; 6-lowest)
Note: All numbers represent average values
Digital Signatures
9
European legislation is predominantly based on Directive
1999/93/EC, which stipulates common obligations for
certification service providers and common rules on liability
and cooperative mechanisms in order to secure trans-border
recognition of signatures and certificates throughout the
European Community.The Directive addresses three forms
of digital signatures: simple, advanced and qualified digital
signature.
A new EU Regulation on electronic identification and trust
services for electronic transactions in the internal market is
expected to be implemented in 2014, in order to consolidate
the use of digital identification and signatures throughout the
European Union. Key cornerstones of new EU regulation include
the removal of existing barriers to delivering a comprehensive
cross-border and cross-sector framework for secure, trustworthy
and easy-to-use electronic transactions, as well as the potential
to enable cloud signatures to achieve the highest level of
security. Full cloud-based signatures will be able to be qualified
once some final requirements are met.
The industry expert interviews conducted by Arthur D. Little
confirmed the general impression that while the law is clearly
defined, it is not yet transparent to the general public, creating
challenges to the potential of the technology.
New Legislation will Further Promote
the Use of E-signatures
Digital Signatures
10
To create a digital signature, it is necessary to have a secure
environment, where the digital certificates needed to perform
the digital signature are managed (issued, potentially stored, and
utilized).This environment is called Public-Key-Infrastructure (PKI)
and can either be locally managed in-house by the service issuer
or can be externally managed by a cloud solution provider and
accessed over the internet. In both cases, the service issuer,
such as a bank, is offering the service to the end-user; either the
token or other device where the certificate is stored is handed
over to the end-user or the end-user is forced by the bank to
sign via the cloud.
The parties involved in the implementation and application
phases of digital signature solutions can be seen in full detail in
the graph below.
The digital signature market in Europe is currently small,
highly fragmented and dynamic.There are new players with
new technologies, established players that focus only on the
signature market and players from other industries that are
trying to diversify.There are both European players, such as
Opentrust and D-Trust, and American players trying to enter
the European market, such as Adobe Echosign, ARX CoSign or
DocuSign, which has already offices in the UK since three years.
In order to facilitate their market entry in Europe, some of the
US players have partnered with local players; Opentrust was
selected by DocuSign as their European partner to jointly create
a new digital sig­nature solution, coupling EU legal compliancy
and ease of use.
In order to highlight the complexity of the market and to give a
comprehensive overview of the main actors, typologies have
been identified and characterized using a bottom-up investigative
approach. Fifteen main suppliers of digital signature solutions
active on the European market have been assessed based on
the chosen typologies.
nn 	User and company convenience: High user convenience
means that the customer is able to process signatures from
any computer, tablet or smart phone, no external devices
(hardware token/ e-ID card) are needed and there is no
need to install any software (SaaS).This high degree of
convenience means that no internal PKI is needed, archiving
(Evidence Management) is outsourced and there is no need
to install any software (SaaS).
nn 	Breadth of use cases guaranteeing legal validity: High
breadth of use cases guaranteeing legal validity (supported
by QES, or at least AES, based on qualified certificate),
means the digital signature solutions offered to the customer
enable many use cases supported by a certified supplier
having the status of trusted third party.
The Digital Signature Market is Highly
Fragmented and Dynamic
Figure 4: The Digital Signature value chain
Source: Arthur D. Little
PKI and other software are offered over the internet (SaaS)
e.g., security provider offering cloud solution including a PKI
and other software
In-house managed
digital signature
Cloud-based external
managed process in
order to use digital
services
Provider of technical
modules
e.g., provider of smart
cards, PKI or signature
software
Issuer of services to
end-users
e.g., bank offering a
customer to sign a
loan agreement by
issuing a token
Issuer of services to
end-users
e.g., bank offering a
customer to sign a
loan agreement via
cloud
User of digital
signature solution
e.g., customer or
employee performing
a digital signature with
a token
User of digital
signature solution
e.g., customer or
employee performing a
digital signature via
cloud
Integrator of technical
modules
e.g., company
integrating PKI at a
bank
Cloud solution provider
External digital
signature solution
(cloud-based)
Service issuer End user
Local digital signature
solution
(local server-based)
Security provider Service issuer End user
Solution
integrator
Digital Signatures
11
Based on the defined dimensions we have identified four main
typologies of suppliers:
nn 	On-the-fly champions
nn 	Closed systems specialists
nn 	Niche vendors
nn 	Rising stars
On-the-fly champions are suppliers offering highly convenient
solutions for customers, such as financial services companies,
banks, or other highly regulated industries, which by the nature
of their work require lots of references and certifications to
guarantee legal validity of digital signature. In a market where
customer-friendly solutions (SaaS) are the key to success, on-
the-fly champions are the most adaptable to customer needs
and also have the highest legal validity of provided solutions.
The clear leader among on-the-fly champions in Europe in both
B2C and B2B is the French supplier, Opentrust, the inventor of
offline and cloud signatures (cloud system certified ETSITS 102
042, ETSITS 102 023 andTüvIT). Positioned as an online notary
(or trusted party) and having jurisprudence in its favor, Opentrust
offers legally valid digital signature solutions with a high user and
company convenience.
Closed systems specialists vendors offer non-cloud based
solutions for medium and large companies with many
customer interactions and a broad range of internal processes
requiring the use of digital signature and who prefer an internal
management of the digital signature solutions. Companies
already having internal PKI systems and already using badges
with certificates inside can reuse these certificates, however
they need to manage the PKI system and the solution is strongly
dependent of the operating systems and web browsers, which
all evolve quite often.The Spanish player, SafeLayer, has an
established presence on the European market especially as a
provider of digital signature solutions for financial institutions
and public administrations, which demand many legally valid use
cases as well as solutions based on their own server, rather than
cloud based, due to the high level of confidential data.
Niche vendors are suppliers offering internal solutions for
smaller customers, not requiring many use cases or end user
interactions.The solutions are not compatible with multi-channel
/ multi-device strategy, making the user experience less rich
and interactive, however offering the advantage of internal
management of the solution.The German player, StepOver, is a
niche vendor providing both digital signature software, but also
hardware components; there are 100,000 StepOver signature
pads already in use. StepOver is the strong partner for smaller
companies, preferring an internal management of their digital
signature solutions.
Rising stars are small suppliers offering cloud-based, convenient
solutions, but with a limited amount of use cases with no EU
legal value, but they have the potential to become the next on-
the-fly-champions, but they still have a long way to go in order
to get certified (ETSITS 101, 102 etc.), to get on the EU trusted
list of verifiable certification authorities and to build a customer
base. For example, the US-based digital signature provider, ARX
CoSign, is still a small player on the European market. Offering
user-convenient solutions, but with no EU legal value, CoSign
needs further certifications in order to increase the legal validity
of its products and thus its European customer base.
Figure 5: The Digital Signature market
Source: Arthur D. Little
High user and company convenience
Low user and company convenience
Rising stars
On-the-fly
champions
Niche
vendors
Closed systems specialists
Low breadth of use
cases guaranteeing
legal validity
High breadth of use
cases guaranteeing
legal validity
Digital Signatures
12
Digital signatures can be applied in various workflows almost
in every economic sector. Use cases embrace any kind of
com­­munication where a declaration of intent combined with
authentication of the parties involved is needed or required by
law. Beyond eID services, which according to secondary research
have not yet been very successful due to the low usability of
the overall solution, the real market belongs to cloud-based
digital signatures due to the convenience of the solution; the
customers can view the contract, tax return, import or export
duties, etc. on any device - whether PC, tablet or phone - get
sms for authentication and then sign with no need for any special
hardware or software.
For the purposes of this report, we have used the following
segmentation for digital signatures:
nn 	Business-to-Business (B2B)
nn 	Business-to-Customer (B2C)
nn 	Government.
The use cases further distinguish between remote and face-to-
face transactions.
nn 	Remote: the signatory is signing the document without a
physical presence of a representative of the service-offering
company (e.g. bank); authentication is also done by a remote
method (e.g. one time password, sms, etc.)
nn 	Face-to-face: the signatory is signing the document with
the physical presence of a representative of the service-
offering company; this representative also authenticates the
signatory (e.g. against a passport or ID document).
Common use cases in B2B
Remote Face-to-face
nn 	Internal management of
documents
nn 	Supplier contract management
nn 	Customer contract management
nn 	Human resources contract
management
nn 	Contract
signing through
roaming sales
(e.g. insurance,
corporate finance)
From the interviews conducted, current project requests and
additional research Arthur D. Little recognizes a steep increase
in the number of companies that are already transforming into
“digital companies” or planning to do so.
Furthermore, it is observed that the acceptance of the
technology is high in the B2B segment, as technologically
advanced business partners are seen as role models.
Common use cases in B2C
Remote Face-to-face
nn Online subscriptions
nn 	SEPA SDD mandate
management
nn 	Account creations
nn 	Contract signing on
tablets in branches
nn 	Contract signing on
tablets by retailers and
distributors (e.g. loans,
insurance)
The applied use cases in B2C depend very much on the
legal validity and the overall customer acceptance of such
technologies, which varies among different markets. Industries
that are generally pioneers in offering these solutions to end-
users are the delivery, banking and the insurance industry.
Common use cases in Government
Remote and Face-to-face
nn Online subscriptions
nn 	SEPA SDD mandate
management
nn 	Account creations
nn 	Contract signing on
tablets in branches
nn 	Contract signing on
tablets by retailers and
distributors (e.g. loans,
insurance)
Governments are generally the main drivers for the cross-
industry diffusion of the technology in Europe. Pressure to
decrease costs is forcing many governments to think about
making their processes leaner, while also guaranteeing security
for sensitive commercial and personal data. Many governments
in Europe offer or even oblige companies or citizens to
communicate with them in a digital way.
Use Cases Provide Insight into the
Practical Application of Digital Signatures
Digital Signatures
13
2
The following case study on Credit Agricole Consumer Finance was prepared by Arthur D. Little, in collaboration with Credit
Agricole’s digital signature supplier, Opentrust, a leading provider of on-the-fly digital signature solutions in Europe in both B2B
and B2C.
Company overview nn Crédit Agricole Consumer Finance is a major consumer credit provider in
France and in Europe
nn Products: Financial products and services (direct sales, point-of-sale
financing, e-commerce, partnerships)
nn Operating in 22 countries
Main drivers for deployment nn Customers expected modernization of workflows and products
nn Reduce cost
Concept of digital solution nn Operating in 22 countries
Areas of application nn Face-to-face transactions (B2B in France, B2C in Italy, other countries
following in the next years)
nn No internal usage so far (secure own authentication available already)
nn B2B2C transactions, with the objective to include digital signature in the
applications of Credit Agricole partners (e.g. put the digital signature in the
checkout of an e-commerce website)
Benefits gained nn Increase of customer journey - Customer satisfaction due to being perceived
as innovative
nn Lower cost expected in the next years compared to paper-based approach
(“will definitely pay off in the near future”)
Challenges nn Took time to guarantee a good customer journey (the whole workflow – not
only digital signing – had to be transformed)
nn Clarification of legal validity needed effort (legal advisory was needed)
nn High initial cost to adapt industrial process
Main criteria for supplier choice nn Legally valid solution
nn Collaborative partnership
nn Technical expertise
Key considerations when choosing
supplier
nn Legal validity of solution and legal advisory by supplier possible
nn Standardized solution for a European-wide deployment
2	 Information gained through interview with Credit Agricole/CA Consumer Finance - representative
Credit Agricole
Consumer Finance Case Study2
Digital Signatures
14
The technology of digital signature will be present in many areas
of our daily life where confidentiality is involved.The technology
brings higher business efficiency and cost savings, and will
be increasingly adopted as a communication tool by business
partners, customers and public authorities. As for every
relatively new technology, hurdles have to be overcome, such as
the ease of integration and alignment with existing workflows,
the business case calculation as well as the lack of transparency
and often misunderstanding of the legal situation. With the new
EU regulation expected to be implemented this year promoting
the overall legal validity as well as acceptance of cloud-based
solutions, there are already very promising signs that authorities
and the supplier industry are overcoming these challenges. As
the market demands a quick return on investment and a solution
that is facilitating workflows, full or partly cloud-based solutions
are expected to take a major part of the digital signature solution
market in the future.Those who realize the potential of such
solutions now will be able to create significant cost advantage,
as well as better maintain and expand their customer base due
to the higher convenience of these solutions.
Conclusion
Contacts
If you would like more information or to arrange an informal discussion on the issues raised here and
how they affect your business, please contact:
Austria
KarimTaga
taga.karim@adlittle.com
Belgium
Gregory Pankert
pankert.gregory@adlittle.com
China
Antoine Doyon
doyon.antoine@adlittle.com
Czech Republic
Dean Brabec
brabec.dean@adlittle.com
France
Didier Levy
levy.didier@adlittle.com
Germany
Michael Opitz
opitz.michael@adlittle.com
India
Srini Srinivasan
srinivasan.srini@adlittle.com
Italy
Giancarlo Agresti
agresti.giancarlo@adlittle.com
Japan
Shinichi Akayama
akayama.shinichi@adlittle.com
Korea
Kevin Lee
lee.kevin@adlittle.com
Latin America
Vincenzo Basile
basile.vincenzo@adlittle.com
Middle East / Malaysia
Thomas Kuruvilla
kuruvilla.thomas@adlittle.com
The Netherlands
Martijn Eikelenboom
eikelenboom.martijn@adlittle.com
Nordic
Martin Glaumann
glaumann.martin@adlittle.com
Singapore
Yuma Ito
ito.yuma@adlittle.com
Spain
Jesus Portal
portal.jesus@adlittle.com
Switzerland
Clemens Schwaiger
schwaiger.clemens@adlittle.com
UK
Richard Swinford
swinford.richard@adlittle.com
USA
John Brennan
brennan.john@adlittle.com
www.adl.com/DigitalSignature
Arthur D. Little
As the world’s first consultancy, Arthur D. Little has been at
the forefront of innovation for more than 125 years. We are
acknowledged as a thought leader in linking strategy, technology
and innovation. Our consultants consistently develop enduring
next generation solutions to master our clients’ business
complexity and to deliver sustainable results suited to the
economic reality of each of our clients.
Arthur D. Little has offices in the most important business cities
around the world. We are proud to serve many of the Fortune
500 companies globally, in addition to other leading firms and
public sector organizations.
For further information please visit www.adl.com
Copyright © Arthur D. Little 2014. All rights reserved.

More Related Content

What's hot

User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?Koru UX Design
 
Draft NISTIR 8202
Draft NISTIR 8202Draft NISTIR 8202
Draft NISTIR 8202i-SCOOP
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Ethereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and thingsEthereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and thingsAlexander Hirner
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CityPeter Waher
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain TechnologyAhmed Banafa
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain TestingCygnet Infotech
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESIJNSA Journal
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?IndSightsResearchSG
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
 
IoT's rapid evolution marks the next stage in the innovation economy - White ...
IoT's rapid evolution marks the next stage in the innovation economy - White ...IoT's rapid evolution marks the next stage in the innovation economy - White ...
IoT's rapid evolution marks the next stage in the innovation economy - White ...Technicolor
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionJK Tech
 
Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital EconomyConnected Futures
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 

What's hot (20)

User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?User Experience of AI - How to marry the two for ultimate success?
User Experience of AI - How to marry the two for ultimate success?
 
Draft NISTIR 8202
Draft NISTIR 8202Draft NISTIR 8202
Draft NISTIR 8202
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
Adopting Emerging Technologies
Adopting Emerging TechnologiesAdopting Emerging Technologies
Adopting Emerging Technologies
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Ethereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and thingsEthereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and things
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Smart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart CitySmart City Lecture 1: How to build a Smart City
Smart City Lecture 1: How to build a Smart City
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain Technology
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
IoT's rapid evolution marks the next stage in the innovation economy - White ...
IoT's rapid evolution marks the next stage in the innovation economy - White ...IoT's rapid evolution marks the next stage in the innovation economy - White ...
IoT's rapid evolution marks the next stage in the innovation economy - White ...
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
Security Everywhere in the Digital Economy
Security Everywhere in the Digital EconomySecurity Everywhere in the Digital Economy
Security Everywhere in the Digital Economy
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 

Viewers also liked

VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX VMworld
 
AutoIt for the rest of us - handout
AutoIt for the rest of us - handoutAutoIt for the rest of us - handout
AutoIt for the rest of us - handoutBecky Yoose
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Website Auto scraping with Autoit and .Net HttpRequest
Website Auto scraping with Autoit and .Net HttpRequestWebsite Auto scraping with Autoit and .Net HttpRequest
Website Auto scraping with Autoit and .Net HttpRequestChen-Tien Tsai
 
Resume and Coverletter Workshop, 2009
Resume and Coverletter Workshop, 2009Resume and Coverletter Workshop, 2009
Resume and Coverletter Workshop, 2009Jenre
 
Digging out Structures for Repurposing: Non-competitive Intelligence ...
Digging out Structures for Repurposing: Non-competitive Intelligence        ...Digging out Structures for Repurposing: Non-competitive Intelligence        ...
Digging out Structures for Repurposing: Non-competitive Intelligence ...Chris Southan
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...Arab Federation for Digital Economy
 
What is iso iec 20000
What is iso iec 20000What is iso iec 20000
What is iso iec 20000Mart Rovers
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFiText Group nv
 
6th Edition Veterans Resources Guide - April 2016
6th Edition Veterans Resources Guide - April 20166th Edition Veterans Resources Guide - April 2016
6th Edition Veterans Resources Guide - April 2016Talia Wesley
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementationIITSW Company
 

Viewers also liked (14)

VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: Security Automation Workflows with NSX
 
AutoIt for the rest of us - handout
AutoIt for the rest of us - handoutAutoIt for the rest of us - handout
AutoIt for the rest of us - handout
 
Crystal_Woods_2016 resume v2
Crystal_Woods_2016 resume v2Crystal_Woods_2016 resume v2
Crystal_Woods_2016 resume v2
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Website Auto scraping with Autoit and .Net HttpRequest
Website Auto scraping with Autoit and .Net HttpRequestWebsite Auto scraping with Autoit and .Net HttpRequest
Website Auto scraping with Autoit and .Net HttpRequest
 
Resume and Coverletter Workshop, 2009
Resume and Coverletter Workshop, 2009Resume and Coverletter Workshop, 2009
Resume and Coverletter Workshop, 2009
 
Digging out Structures for Repurposing: Non-competitive Intelligence ...
Digging out Structures for Repurposing: Non-competitive Intelligence        ...Digging out Structures for Repurposing: Non-competitive Intelligence        ...
Digging out Structures for Repurposing: Non-competitive Intelligence ...
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
What is iso iec 20000
What is iso iec 20000What is iso iec 20000
What is iso iec 20000
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Digital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDFDigital Signatures: how it's done in PDF
Digital Signatures: how it's done in PDF
 
6th Edition Veterans Resources Guide - April 2016
6th Edition Veterans Resources Guide - April 20166th Edition Veterans Resources Guide - April 2016
6th Edition Veterans Resources Guide - April 2016
 
Iso 20000 standard implementation
Iso 20000 standard implementationIso 20000 standard implementation
Iso 20000 standard implementation
 

Similar to Digital signatures, paving the way to a digital Europe_Arthur D Little_2014

Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationLarry Kluger
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Digital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by ExelaDigital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by ExelaDrysign By Exela
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceNiranjanaDhumal
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatPalash Mehar
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
All the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdfAll the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdfDrysign By Exela
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 

Similar to Digital signatures, paving the way to a digital Europe_Arthur D Little_2014 (20)

Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 
Digital signatur
Digital signaturDigital signatur
Digital signatur
 
Crossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital TransformationCrossing the Rubicon: Digital Signatures and Digital Transformation
Crossing the Rubicon: Digital Signatures and Digital Transformation
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
Blockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by ExelaBlockchain - The Future of Digital Signatures - DrySign by Exela
Blockchain - The Future of Digital Signatures - DrySign by Exela
 
Digital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by ExelaDigital Signatures for E-tendering -DrySign by Exela
Digital Signatures for E-tendering -DrySign by Exela
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplace
 
Creation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe AcrobatCreation & Verification of Digital Signature using Adobe Acrobat
Creation & Verification of Digital Signature using Adobe Acrobat
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
All the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdfAll the Answers You need about E-signing.pdf
All the Answers You need about E-signing.pdf
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 

More from Market Engel SAS

MODI Vision Health Station
MODI Vision Health StationMODI Vision Health Station
MODI Vision Health StationMarket Engel SAS
 
About aevatar french version
About aevatar french versionAbout aevatar french version
About aevatar french versionMarket Engel SAS
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...Market Engel SAS
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptMarket Engel SAS
 
Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-programMarket Engel SAS
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014Market Engel SAS
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZMarket Engel SAS
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyMarket Engel SAS
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Market Engel SAS
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux Market Engel SAS
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...Market Engel SAS
 

More from Market Engel SAS (20)

MODI Vision Health Station
MODI Vision Health StationMODI Vision Health Station
MODI Vision Health Station
 
About aevatar french version
About aevatar french versionAbout aevatar french version
About aevatar french version
 
About Aevatar
About Aevatar About Aevatar
About Aevatar
 
_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese
 
Happy new year mmxvi
Happy new year mmxviHappy new year mmxvi
Happy new year mmxvi
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
 
Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-program
 
Happy new year 2015 !
Happy new year 2015 !Happy new year 2015 !
Happy new year 2015 !
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
AuditMyApps_English
AuditMyApps_EnglishAuditMyApps_English
AuditMyApps_English
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZ
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's survey
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
 
Gamers in the UK
Gamers in the UKGamers in the UK
Gamers in the UK
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
 

Recently uploaded

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 

Recently uploaded (20)

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 

Digital signatures, paving the way to a digital Europe_Arthur D Little_2014

  • 1. Telecommunications, Information, Media & Electronics Paving the Way to a Digital Europe Digital Signatures
  • 2. Content Introduction 3 Digital Signatures – Authenticity and Integrity of Data Provides a High Level of Security 4 Benefits Include Decreased Costs and Greater Efficiency 7 Several Challenges Still Need to be Overcome 8 New Legislation will Further Promote the Use of E-signatures 9 The Digital Signature Market is Highly Fragmented and Dynamic 10 Use Cases Provide Insight into the Practical Application of Digital Signatures 12 Credit Agricole Consumer Finance Case Study 13 Conclusion 14 Authors: Nicolai Schaettgen Principal TIME, Austria schaettgen.nicolai@adlittle.com Didier Levy Director TIME, France levy.didier@adlittle.com Sorana Socol Business Analyst TIME, Austria socol.sorana@adlittle.com Julien Duvaud-Schelnast Manager TIME, France duvaud-schelnast.julien@adlittle.com
  • 3. 3 Digital signature solutions are quickly replacing paper-based signatures and have the potential to dominate signature-related processes.The primary benefits of this technology include increased efficiency, lower costs and increased customer satisfaction. Processes that still require a handwritten signature slow down turnaround time, increase complexity in terms of archiving, and also raise environmental issues with regards to paper usage. Companies are therefore increasingly adopting digital signature solutions to address those challenges. The financial services industry is the pioneer in the adoption and development of digital signature solutions, and we expect other industries, such as telecommunica­tion, commerce, utilities, notaries and healthcare, to follow soon as the benefits of this new technology, namely increased efficiency, lower costs and increased customer satisfaction, are not restricted to any industry. While offering clear advantages, digital signature solutions still need to overcome some challenges, such as the need to adapt existing systems and processes to the new technology, concern about acceptance by business partners and the perceived high cost. The European Union is currently finalizing regulation, which will increase the legal value of advanced electronic signatures and remote electronic signing services by offering the possibility to generate a qualified digital signature using a remote signing system.The regulation is expected to be enacted in early July 2014.This development is expected to serve as an example for other markets on how to approach digital signatures from a regulatory standpoint. This report is based on Arthur D. Little’s survey of 50 market experts in Europe, as well as comprehensive secondary market research. In this report, we provide an overview of the digital signature technology, its current and potential market, as well as the benefits and challenges it brings. We also present examples of practical applications of digital signature solutions. Introduction
  • 4. Digital Signatures 4 Digital signature solutions are quickly replacing paper-based signatures and have the potential to dominate signature-related processes.The primary benefits of this technology include increased efficiency, lower costs and increased customer satisfaction. Digital signatures need to be clearly distinguished from ordinary authentication processes. While authentication is only used to verify the identities of end-users, digital signatures also ensure the integrity of data. A combination of these two security factors is critical for many business transactions, especially those involving sensitive and confidential data. Digital signatures are a sub-category of electronic signatures. While an digital signature can be any kind of data attached to a document, such as a written name below an email, a digital signature is based on a mathematical process of protecting the document.There are two major types of digital signatures, differentiable only by how securely the authentication has been processed: nn Qualified digital signature (QES) is a signature that is created with a secure signature-creation device, other than the device where the document is actually signed, which provides very high security; nn Advanced digital signature (AES) is a digital signature where the signature could be created on the same device where the document is signed, which is somewhat less secure than QES A digital signature involves three processes: the signing process, the authentication process and the process of ensuring the integrity of data.The process of creating a digital signature is the same, whether internally or externally managed. nn The signing process starts by providing an end-user with a document that needs to be signed. In order to be sure that the correct person signs the contract, the end-user’s identity is verified by multiple factor authentication, such as a PIN, password and sequence-based token codes. Once the identity is verified, the signer receives a certificate proving his identity and providing him with a pair of keys: a private key (known only to the signer) and a public key (known to the public).These keys are necessary to sign a document and to verify the identity of the signer. Once the certificate is issued, a unique mathematical code is created out of the document.This mathematical code is then encrypted with the private key (signing) and can only be decrypted with the corresponding public key (verification of signature).The document, together with the encrypted mathematical code, is then sent to the recipient. nn In order to ensure authenticity, the recipient with access to the public key can decrypt the mathematical code and is therefore able to ensure authenticity.The public key works for decryption only if the document was signed with the corresponding private key already confirming the identity of the signer. nn The integrity of data is ensured through a mathematical code, which is visible to the receiver after the decryption. To verify that the document has not been changed by any unauthorized person, the receiver calculates his own mathematical code out of the document. If both codes match, the integrity of the data is ensured; if the document had been changed in transition, the receiver’s calculation would give a different code. Digital Signatures Authenticity and Integrity of Data Provides a High Level of Security Figure 1: The Digital Signature signing and verification processes Source: Arthur D. Little Hash function 10100101011 Hash value Encryption with private key 10100101011 10100101011 Digitally signed data Verification process 10100101011 Hash function Decryption with public key 10100101011 10100101011= ? The digital signature is valid only if the hash values are equal. Signing process
  • 5. Digital Signatures 5 Figure 1 illustrates the signing and verification process on the basis of the RSA (Rivest, Shamir and Adleman) cryptosystem technology, which is the most widely used encryption technology. The encryption process described above provides the foundation for the high security and the legal validity of this technology.The mathematical encryption combined with a high quality certificate ensures the integrity and authenticity of the digital signature. The resulting advanced digital signature is covered under EU law and therefore legally valid. Any process not encompassing these security measures are not regarded as secure or legally valid. Remote and face-to-face transactions should therefore be based on the above procedure of securing data. For example, a handwritten digital signature on a signature pad without a digital signature created is not legally valid in court decisions, based on the precedent legal case from June 2012 in Germany1 . Other commonly used techniques encompass the recognition of biometric data, such as the speed or pressure of the signature, in order to authenticate the signatory.This technology is certainly more secure than a simple handwritten signature on a signature pad, but it is not covered by EU law or most national laws and provides therefore no legal validity. There are two major ways to offer digital signature solutions to end-users: an externally managed process and an internally managed process. Although both have advantages and disadvantages, based on analysis of market trends, Arthur D. Little believes that the externally managed process will be the solution of the future. Externally managed process (external Public-Key- Infrastructure or PKI) During the externally managed process, an external company provides the certificates needed for the digital signature.The third party is responsible for providing one-time certificates to employees and / or customers of the company after they have been authenticated. With a fully externally managed process, companies do not need to invest in set-up and maintenance, which results in a lower overall cost of implementation. Preferably, the external service provider should offer a full cloud solution, the primary advantage of which is that the certificates are not stored on any SSCD (Secure Signature Creation Device or token), but in the cloud and can therefore be used on any device. Furthermore, no specific Software as a Service (SaaS) has to be installed, increasing the level of trust and convenience 1 http://www.justiz.bayern.de/gericht/olg/m/presse/archiv/2012/03561/ for the customer. Studies have shown that customers who are asked to install software when digitally signing are more likely to cancel the process. For customers, the strongest incentive is convenience. Digital signatures are a much easier way to sign for a document compared to plugging an e-ID card into a PC and even to the traditional handwritten signature.The cloud enables companies also to offer multi-channel signatures (e.g. one signature from home, the other from mobile phone). As mobile signing from a tablet or smart phone becomes more popular, a cloud-managed service will be the preferred technology.This was also confirmed in the interviews Arthur D. Little conducted, in which one market player responded, “Why should we ask customers to carry always a token or smart-card reader with them?” It is important to mention here that this type of concept makes the most sense if the third party is a trusted one, such as on the EU trusted list.This will not only raise the overall level of trust, but the certificates provided by a trusted third party are recognized virtually worldwide, which means that the root certificate, a certificate that is verified as trusted, is already installed in most browsers and operating systems and no error message will appear as with the internally managed process. With cloud solutions, there is also the possibility to perform the signature with an SSCD or a smart card. Here the cloud can be used to securely archive the digitally signed documents. Internally managed process (internal PKI) The certificates needed for the digital signature are established and provided internally by the company offering these solutions to employees or customers directly. Certificates are not one- time certificates, but can be reused, as they are stored on specific badges, such as a token, smart cards, etc. The concept requires an infrastructure that securely manages identities and corresponding certificates.The process of implementing a PKI involves an investment into hardware, software, and training for employees, and is therefore rather applicable for larger corporations with the corresponding knowledge and resources. A major drawback of the internal PKI concept is that the certificates are in most cases not trusted by browsers and operating systems, unless the company is on the EU trusted list. Depending on the resources available and the level of trust and control required, each company has to weigh which solution suits it best. However, there are already indications that solutions where additional external devices are needed to create digital signatures will not be popular with the general public. 15 European countries deployed electronic identity cards (eID)
  • 6. Digital Signatures 6 containing credentials for online authentication, with a majority also offering an optional digital signature function.To be able to make use of this digital signature function, a card reader for the eID needs to be bought, further complicating this concept. The potential of this solution could, however, be improved with NFC (Near Field Communication) technology enabling the usage of the digital signature with eIDs without a card reader, such as with an NFC smart phone. Although the ability to sign using a smart phone would guarantee a higher level of mobility, it is expected that full cloud solutions not requiring any card or card reader will dominate the future market for digital signatures, as the level of convenience provided will be the decisive factor in the choice of solution.
  • 7. Digital Signatures 7 Benefits Include Decreased Costs and Greater Efficiency Digital signatures can be implemented in a variety of areas as companies can use digital signatures for their internal processes or communication with business partners and customers. Governments are also an important category of customers for this technology, as they are increasingly required to implement leaner and cost-minimizing processes. Many companies and governments have already realized the potential of this technology. A fully digital process of signing and sending documents decreases work hours and reduces cost in paper and transport. Arthur D. Little’s survey and further analysis confirmed that the immediate adoption of the technology has the potential to create a sustainable competitive advantage independent of the industry in which a company operates. According to the results of Arthur D. Little’s survey, the main argument for adopting the technology is to improve efficiency, leading to the reduction of costs, and to increase to the speed of the overall business.The use of digital signatures decreases costs by reducing processing costs, such as scanning, recording, archiving, printing and mailing, and reduces resource expense (less process cycle time results in lower personnel expenses). Business processes are also made more efficient by increasing the overall agility of enterprises (reduced process cycles, speed of closing business) and through the real time tracking and coordination of business. Besides efficiency considerations, adopting digital signature solutions portray a progressive image of both the user and the provider of such technologies. Also digital signature solutions have the potential to increase customer convenience. For example, a bank can offer its customers multi-channel solutions to sign a loan agreement. Although industry experts taking part in the survey did not regard increased security as a major benefit of the technology, digital signatures provide a higher level of security than traditional methods of sending documents, when implemented appropriately with cryptographic procedures with qualified certificates: nn The integrity of data can be ensured as counterfeiting is virtually impossible, while a paper document can be modified after being signed by an unauthorized person, nn The probability of losing a digital copy is much lower compared to paper-based documents, nn All types of data, such as photos or audio files, can be digitally signed, which protects the copyright of these materials, nn A timestamp can be attached to the digital signature, ensuring that the document was signed on a specific date. What do you see as the main benefits expected of deploying Digital Signature solutions? (1-highest; 6-lowest) Figure 2: The major benefits of Digital Signatures Note: All numbers represent average values 2,7 2,7 2,3 2,3 2,1 Increased security Increased convenience Improved commercial efficiency Time saving (turnaround time) Cost saving (paper, storage, etc.)
  • 8. Digital Signatures 8 Despite the potential of the technology, the implementation of digital signature solutions also brings along challenges. A majority of companies have systems and processes designed around traditional methods of contractual communication. From an employee’s desk to the archiving of signed documents, the adaption of existing applications or systems was regarded as a major issue in the interviews. Companies and institutions interested in adopting the technology are therefore highly dependent on trusted, easy-to-implement and convenient solutions that do not increase the complexity of workflows. Suppliers able to offer this important mixture of characteristics will likely have substantial competitive advantage in the market for digital signature. Furthermore, there is still an issue with the acceptance of business partners/customers. From the survey, however, it was clear that this acceptance is strongly dependent on the solutions offered to customers, meaning that a broad range of use cases guaranteeing ease of usage will raise the acceptance of natural and business partners. There was also the impression among respondents that implementing digital signature solutions will incur a high cost of investment.This argument is applicable in the short-term, but reduced costs offset the cost of investment generally in a very short time.The cost of a particular solution depends on the type of implementation. Cloud solutions result in lower implementation cost.The overall cost, however, depends on the solution’s pricing model and on the frequency of usage. Certified email could present a risk to digital signatures Certified email is a service that is also aiming to ensure a secure transfer of data between sender and recipient by enabling emails to be encrypted by the sender and decrypted by the receiver. In order to do so, the sender and the receiver need to have a certified email account with a certified email provider and software that is able to encrypt and decrypt emails. If authenticity of the sender plays an important role in the transaction at hand, the certified email can also be digitally signed (with a qualified digital signature). A major security issue with certified email is that it is not based on an end-to-end encryption process, meaning that every email that was encrypted by the sender is decrypted by both certified email providers (email could be read or modified), representing a security issue that could be utilized by unauthorized parties. There is a possibility to enable end-to-end encryption, but only with additional encryption software. Compared to classic digital signature solutions, email has security and convenience disadvantages as the standard model is not based on end-to-end encryption and because both the sender and the receiver must have a certified email account. Several Challenges Still Need to be Overcome 3,3 3,0 2,8 2,1 2,8Investment / implementation cost B2C, B2B acceptance Adaption of existing applications or systems Security issues Legal issues Figure 3: The primary challenges of Digital Signatures What do you see as the main challenges with regards to Digital Signature solutions? (1-highest; 6-lowest) Note: All numbers represent average values
  • 9. Digital Signatures 9 European legislation is predominantly based on Directive 1999/93/EC, which stipulates common obligations for certification service providers and common rules on liability and cooperative mechanisms in order to secure trans-border recognition of signatures and certificates throughout the European Community.The Directive addresses three forms of digital signatures: simple, advanced and qualified digital signature. A new EU Regulation on electronic identification and trust services for electronic transactions in the internal market is expected to be implemented in 2014, in order to consolidate the use of digital identification and signatures throughout the European Union. Key cornerstones of new EU regulation include the removal of existing barriers to delivering a comprehensive cross-border and cross-sector framework for secure, trustworthy and easy-to-use electronic transactions, as well as the potential to enable cloud signatures to achieve the highest level of security. Full cloud-based signatures will be able to be qualified once some final requirements are met. The industry expert interviews conducted by Arthur D. Little confirmed the general impression that while the law is clearly defined, it is not yet transparent to the general public, creating challenges to the potential of the technology. New Legislation will Further Promote the Use of E-signatures
  • 10. Digital Signatures 10 To create a digital signature, it is necessary to have a secure environment, where the digital certificates needed to perform the digital signature are managed (issued, potentially stored, and utilized).This environment is called Public-Key-Infrastructure (PKI) and can either be locally managed in-house by the service issuer or can be externally managed by a cloud solution provider and accessed over the internet. In both cases, the service issuer, such as a bank, is offering the service to the end-user; either the token or other device where the certificate is stored is handed over to the end-user or the end-user is forced by the bank to sign via the cloud. The parties involved in the implementation and application phases of digital signature solutions can be seen in full detail in the graph below. The digital signature market in Europe is currently small, highly fragmented and dynamic.There are new players with new technologies, established players that focus only on the signature market and players from other industries that are trying to diversify.There are both European players, such as Opentrust and D-Trust, and American players trying to enter the European market, such as Adobe Echosign, ARX CoSign or DocuSign, which has already offices in the UK since three years. In order to facilitate their market entry in Europe, some of the US players have partnered with local players; Opentrust was selected by DocuSign as their European partner to jointly create a new digital sig­nature solution, coupling EU legal compliancy and ease of use. In order to highlight the complexity of the market and to give a comprehensive overview of the main actors, typologies have been identified and characterized using a bottom-up investigative approach. Fifteen main suppliers of digital signature solutions active on the European market have been assessed based on the chosen typologies. nn User and company convenience: High user convenience means that the customer is able to process signatures from any computer, tablet or smart phone, no external devices (hardware token/ e-ID card) are needed and there is no need to install any software (SaaS).This high degree of convenience means that no internal PKI is needed, archiving (Evidence Management) is outsourced and there is no need to install any software (SaaS). nn Breadth of use cases guaranteeing legal validity: High breadth of use cases guaranteeing legal validity (supported by QES, or at least AES, based on qualified certificate), means the digital signature solutions offered to the customer enable many use cases supported by a certified supplier having the status of trusted third party. The Digital Signature Market is Highly Fragmented and Dynamic Figure 4: The Digital Signature value chain Source: Arthur D. Little PKI and other software are offered over the internet (SaaS) e.g., security provider offering cloud solution including a PKI and other software In-house managed digital signature Cloud-based external managed process in order to use digital services Provider of technical modules e.g., provider of smart cards, PKI or signature software Issuer of services to end-users e.g., bank offering a customer to sign a loan agreement by issuing a token Issuer of services to end-users e.g., bank offering a customer to sign a loan agreement via cloud User of digital signature solution e.g., customer or employee performing a digital signature with a token User of digital signature solution e.g., customer or employee performing a digital signature via cloud Integrator of technical modules e.g., company integrating PKI at a bank Cloud solution provider External digital signature solution (cloud-based) Service issuer End user Local digital signature solution (local server-based) Security provider Service issuer End user Solution integrator
  • 11. Digital Signatures 11 Based on the defined dimensions we have identified four main typologies of suppliers: nn On-the-fly champions nn Closed systems specialists nn Niche vendors nn Rising stars On-the-fly champions are suppliers offering highly convenient solutions for customers, such as financial services companies, banks, or other highly regulated industries, which by the nature of their work require lots of references and certifications to guarantee legal validity of digital signature. In a market where customer-friendly solutions (SaaS) are the key to success, on- the-fly champions are the most adaptable to customer needs and also have the highest legal validity of provided solutions. The clear leader among on-the-fly champions in Europe in both B2C and B2B is the French supplier, Opentrust, the inventor of offline and cloud signatures (cloud system certified ETSITS 102 042, ETSITS 102 023 andTüvIT). Positioned as an online notary (or trusted party) and having jurisprudence in its favor, Opentrust offers legally valid digital signature solutions with a high user and company convenience. Closed systems specialists vendors offer non-cloud based solutions for medium and large companies with many customer interactions and a broad range of internal processes requiring the use of digital signature and who prefer an internal management of the digital signature solutions. Companies already having internal PKI systems and already using badges with certificates inside can reuse these certificates, however they need to manage the PKI system and the solution is strongly dependent of the operating systems and web browsers, which all evolve quite often.The Spanish player, SafeLayer, has an established presence on the European market especially as a provider of digital signature solutions for financial institutions and public administrations, which demand many legally valid use cases as well as solutions based on their own server, rather than cloud based, due to the high level of confidential data. Niche vendors are suppliers offering internal solutions for smaller customers, not requiring many use cases or end user interactions.The solutions are not compatible with multi-channel / multi-device strategy, making the user experience less rich and interactive, however offering the advantage of internal management of the solution.The German player, StepOver, is a niche vendor providing both digital signature software, but also hardware components; there are 100,000 StepOver signature pads already in use. StepOver is the strong partner for smaller companies, preferring an internal management of their digital signature solutions. Rising stars are small suppliers offering cloud-based, convenient solutions, but with a limited amount of use cases with no EU legal value, but they have the potential to become the next on- the-fly-champions, but they still have a long way to go in order to get certified (ETSITS 101, 102 etc.), to get on the EU trusted list of verifiable certification authorities and to build a customer base. For example, the US-based digital signature provider, ARX CoSign, is still a small player on the European market. Offering user-convenient solutions, but with no EU legal value, CoSign needs further certifications in order to increase the legal validity of its products and thus its European customer base. Figure 5: The Digital Signature market Source: Arthur D. Little High user and company convenience Low user and company convenience Rising stars On-the-fly champions Niche vendors Closed systems specialists Low breadth of use cases guaranteeing legal validity High breadth of use cases guaranteeing legal validity
  • 12. Digital Signatures 12 Digital signatures can be applied in various workflows almost in every economic sector. Use cases embrace any kind of com­­munication where a declaration of intent combined with authentication of the parties involved is needed or required by law. Beyond eID services, which according to secondary research have not yet been very successful due to the low usability of the overall solution, the real market belongs to cloud-based digital signatures due to the convenience of the solution; the customers can view the contract, tax return, import or export duties, etc. on any device - whether PC, tablet or phone - get sms for authentication and then sign with no need for any special hardware or software. For the purposes of this report, we have used the following segmentation for digital signatures: nn Business-to-Business (B2B) nn Business-to-Customer (B2C) nn Government. The use cases further distinguish between remote and face-to- face transactions. nn Remote: the signatory is signing the document without a physical presence of a representative of the service-offering company (e.g. bank); authentication is also done by a remote method (e.g. one time password, sms, etc.) nn Face-to-face: the signatory is signing the document with the physical presence of a representative of the service- offering company; this representative also authenticates the signatory (e.g. against a passport or ID document). Common use cases in B2B Remote Face-to-face nn Internal management of documents nn Supplier contract management nn Customer contract management nn Human resources contract management nn Contract signing through roaming sales (e.g. insurance, corporate finance) From the interviews conducted, current project requests and additional research Arthur D. Little recognizes a steep increase in the number of companies that are already transforming into “digital companies” or planning to do so. Furthermore, it is observed that the acceptance of the technology is high in the B2B segment, as technologically advanced business partners are seen as role models. Common use cases in B2C Remote Face-to-face nn Online subscriptions nn SEPA SDD mandate management nn Account creations nn Contract signing on tablets in branches nn Contract signing on tablets by retailers and distributors (e.g. loans, insurance) The applied use cases in B2C depend very much on the legal validity and the overall customer acceptance of such technologies, which varies among different markets. Industries that are generally pioneers in offering these solutions to end- users are the delivery, banking and the insurance industry. Common use cases in Government Remote and Face-to-face nn Online subscriptions nn SEPA SDD mandate management nn Account creations nn Contract signing on tablets in branches nn Contract signing on tablets by retailers and distributors (e.g. loans, insurance) Governments are generally the main drivers for the cross- industry diffusion of the technology in Europe. Pressure to decrease costs is forcing many governments to think about making their processes leaner, while also guaranteeing security for sensitive commercial and personal data. Many governments in Europe offer or even oblige companies or citizens to communicate with them in a digital way. Use Cases Provide Insight into the Practical Application of Digital Signatures
  • 13. Digital Signatures 13 2 The following case study on Credit Agricole Consumer Finance was prepared by Arthur D. Little, in collaboration with Credit Agricole’s digital signature supplier, Opentrust, a leading provider of on-the-fly digital signature solutions in Europe in both B2B and B2C. Company overview nn Crédit Agricole Consumer Finance is a major consumer credit provider in France and in Europe nn Products: Financial products and services (direct sales, point-of-sale financing, e-commerce, partnerships) nn Operating in 22 countries Main drivers for deployment nn Customers expected modernization of workflows and products nn Reduce cost Concept of digital solution nn Operating in 22 countries Areas of application nn Face-to-face transactions (B2B in France, B2C in Italy, other countries following in the next years) nn No internal usage so far (secure own authentication available already) nn B2B2C transactions, with the objective to include digital signature in the applications of Credit Agricole partners (e.g. put the digital signature in the checkout of an e-commerce website) Benefits gained nn Increase of customer journey - Customer satisfaction due to being perceived as innovative nn Lower cost expected in the next years compared to paper-based approach (“will definitely pay off in the near future”) Challenges nn Took time to guarantee a good customer journey (the whole workflow – not only digital signing – had to be transformed) nn Clarification of legal validity needed effort (legal advisory was needed) nn High initial cost to adapt industrial process Main criteria for supplier choice nn Legally valid solution nn Collaborative partnership nn Technical expertise Key considerations when choosing supplier nn Legal validity of solution and legal advisory by supplier possible nn Standardized solution for a European-wide deployment 2 Information gained through interview with Credit Agricole/CA Consumer Finance - representative Credit Agricole Consumer Finance Case Study2
  • 14. Digital Signatures 14 The technology of digital signature will be present in many areas of our daily life where confidentiality is involved.The technology brings higher business efficiency and cost savings, and will be increasingly adopted as a communication tool by business partners, customers and public authorities. As for every relatively new technology, hurdles have to be overcome, such as the ease of integration and alignment with existing workflows, the business case calculation as well as the lack of transparency and often misunderstanding of the legal situation. With the new EU regulation expected to be implemented this year promoting the overall legal validity as well as acceptance of cloud-based solutions, there are already very promising signs that authorities and the supplier industry are overcoming these challenges. As the market demands a quick return on investment and a solution that is facilitating workflows, full or partly cloud-based solutions are expected to take a major part of the digital signature solution market in the future.Those who realize the potential of such solutions now will be able to create significant cost advantage, as well as better maintain and expand their customer base due to the higher convenience of these solutions. Conclusion
  • 15. Contacts If you would like more information or to arrange an informal discussion on the issues raised here and how they affect your business, please contact: Austria KarimTaga taga.karim@adlittle.com Belgium Gregory Pankert pankert.gregory@adlittle.com China Antoine Doyon doyon.antoine@adlittle.com Czech Republic Dean Brabec brabec.dean@adlittle.com France Didier Levy levy.didier@adlittle.com Germany Michael Opitz opitz.michael@adlittle.com India Srini Srinivasan srinivasan.srini@adlittle.com Italy Giancarlo Agresti agresti.giancarlo@adlittle.com Japan Shinichi Akayama akayama.shinichi@adlittle.com Korea Kevin Lee lee.kevin@adlittle.com Latin America Vincenzo Basile basile.vincenzo@adlittle.com Middle East / Malaysia Thomas Kuruvilla kuruvilla.thomas@adlittle.com The Netherlands Martijn Eikelenboom eikelenboom.martijn@adlittle.com Nordic Martin Glaumann glaumann.martin@adlittle.com Singapore Yuma Ito ito.yuma@adlittle.com Spain Jesus Portal portal.jesus@adlittle.com Switzerland Clemens Schwaiger schwaiger.clemens@adlittle.com UK Richard Swinford swinford.richard@adlittle.com USA John Brennan brennan.john@adlittle.com
  • 16. www.adl.com/DigitalSignature Arthur D. Little As the world’s first consultancy, Arthur D. Little has been at the forefront of innovation for more than 125 years. We are acknowledged as a thought leader in linking strategy, technology and innovation. Our consultants consistently develop enduring next generation solutions to master our clients’ business complexity and to deliver sustainable results suited to the economic reality of each of our clients. Arthur D. Little has offices in the most important business cities around the world. We are proud to serve many of the Fortune 500 companies globally, in addition to other leading firms and public sector organizations. For further information please visit www.adl.com Copyright © Arthur D. Little 2014. All rights reserved.