Cen ws xbrl
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

CEN/WS XBRL PowerPoint PPT Presentation


  • 82 Views
  • Uploaded on
  • Presentation posted in: General

CEN/WS XBRL. CWA2: Hot topics of interest in 2nd level reporting. 20 February 2013 Ignacio Boixo. CWA2. Hot topics of interest in 2 nd level reporting. Workflow on 2 nd level reporting Proof of concept e-mail validation Core Business Vocabulary Legal Entity Identifier

Download Presentation

CEN/WS XBRL

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Cen ws xbrl

CEN/WS XBRL

  • CWA2:

  • Hot topics of interest in 2nd level reporting

20 February 2013

Ignacio Boixo

CWA2


Hot topics of interest in 2 nd level reporting

Hot topics of interest in 2nd level reporting

Workflow on 2nd level reporting

Proof of concept e-mail validation

Core Business Vocabulary

Legal Entity Identifier

Any other Business?


Requirement example workflow

Requirement: example workflow

Signature (and encryption) via National

regulator public certificate

Signature (and encryption) using

European regulator

public certificate

Submission container

Subcontainer

header.xml

nationalinstance1.xbrl

nationalinstance2.xbrl

Subcontainer

Declarer

European

Supervision

Authority

National Supervision Authority


Cen ws xbrl

Alternative A: Signature encapsulated

Zip

Zip

Zip

Header

Instance 1, Instance 2, …,

Instance n

Header

Instance 1, Instance 2, …,

Instance n

Header

Instance 1, Instance 2, …,

Instance n

Encryption (public key of the first addressee)

Other

Authority:

BIS / ESRB / Banking Union / …

National Supervision Authority

Other

Authority:

e.g. EBA

Signature 1 (contributor 1 - private key)

Signature 2 (contributor 2 - private key)

Signature/ Encryption (addressee certificate)

& transfer

Encryption (public key 2nd addressee)

Signature 3 (contributor 3 key)

transfer


Cen ws xbrl

Alternative Z: Zip-encapsulated

Encryption (public key of the first addressee)

National Supervision Authority

Other

Authority:

e.g. EBA

Other

Authority:

BIS / ESRB / Banking Union / …

Signature 1 (contributor 1 - private key)

Zip

  • Header

  • Instance 1

  • Instance 2

  • ...

  • Instance n

  • SignedSubContainers

  • XadesSignedSubcontainer.xml

    • signed with contributor 2 private key

    • Inside, zip file with a new Header, Instance 1, Instance 2, …, Instance n.

  • FullSubContainers

  • EncryptedSubcontainer.xml

    • public key 2nd addressee

    • signed with contributor 3 private key

    • Inside the signed, zip file with a new Header, Instance 1, Instance 2, …, Instance n.

Encryption (next

addressee)

& transfer

Transfer

only

Page 5


Characteristics

Characteristics

Alternatives are functionally equivalent: both provide

Xades-signed sub-containers for trusting authorities

Fully encrypted subcontainers for non-trusting authorities

Both alternatives can deliver as a result a set of files using a generic decomposition tool

For Alternative 1, the result file set will be a flat set of files having their original filenames

For Alternative 2, the result file set will be a hierarchical set of files (in accordance with the folder hierarchy defined in the .zip container, both folders and files having their original name)

Problem : How shall the NSA identify the final recipients of the subpackages (EBA, Banking union, etc)?

For Alternative 1, the addressee of the subcontainer has to be identified using a non-standard xml tag (requiring thus an intermediate xml schema which is not standard?)

For Alternative 2, a file naming convention would be required in the instructions of the NSA to identify the addressee of the subpackage


Proof of concept e mail validation

Proof of concept e-mail validation

Encryption (XML Encryption)

Encryption (XML Encryption)

Signature (XADES-EPES)

Zip

Signature (XADES-EPES)

Instance-1

Instance-n

Package & Compress (zip)

Feedback

instance1.xml

instance2.xml

instancen.xml

Eurofiling

Test

Validator

(Arelle)

Anonymous


Cen ws xbrl

http://joinup.ec.europa.eu/asset/core_business/description


Cen ws xbrl

Legal Entity Identifier and mapping to Core Business Vocabulary


Cen ws xbrl

Legal Entity Identifier


Cen ws xbrl

Legal Entity Identifier


Cen ws xbrl

http://www.dtcc.com/downloads/news/CiCi_Report.pdf


Cen ws xbrl

http://www.dtcc.com/downloads/news/CiCi_Report.pdf


Cen ws xbrl

http://www.dtcc.com/downloads/news/CiCi_Report.pdf


Thanks for your attention

Thanks for your attention

[email protected] (as back up of [email protected])

Comments or questions?


  • Login