Protection of POS systems and measurement systems against - - PowerPoint PPT Presentation

protection of pos systems and measurement systems against
SMART_READER_LITE
LIVE PREVIEW

Protection of POS systems and measurement systems against - - PowerPoint PPT Presentation

Physikalisch-Technische Bundesanstalt Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Braunschweig und Berlin Protection of POS systems and measurement systems against manipulations Norbert Zisky Norbert Zisky Physikalisch-


slide-1
SLIDE 1

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 1 Norbert Zisky 1

Protection of POS systems and measurement systems against manipulations

Norbert Zisky Norbert Zisky Physikalisch Physikalisch-

  • Technische Bundesanstalt

Technische Bundesanstalt

Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Physikalisch-Technische Bundesanstalt Braunschweig und Berlin

slide-2
SLIDE 2

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 2 Norbert Zisky 2

Content Content

History Problem Solution Presentation of the technical concept Current situation of the needed technique Expenditure of money and technique Planned tax audit procedures Dates for technical point of view Conclusion

slide-3
SLIDE 3

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 3 Norbert Zisky 3

The Federal Audit Office (BHR) has complained that later models of electronic cash registers and cash management systems now fail to meet the principles of correct accounting practice when it comes to recording transactions … The risk of tax fraud running into many billions [of euro] should not be underestimated in cash transactions

Big problems in tax compliance were indicated in 2003

History Germans way to fiscal solutions History Germans way to fiscal solutions

The German Ministry of Finance had to find a solution for this problem In 2004 cash register group started its work

slide-4
SLIDE 4

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 4 Norbert Zisky 4

Using functions for service technicians for manipulation (e.g. setting of Z-report-counter or grand total) Misuse of training functions Using report generators (e.g. suppression of voids in printout) Direct data modification in files or data bases) on (PC-based systems Reports generated by ECRs can be manipulated relative easily – possibilities using standard functions:

Problem Possibilities of manipulation (1) Problem Possibilities of manipulation (1)

slide-5
SLIDE 5

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 5 Norbert Zisky 5

Deletion of complete transactions from the electronic journal and re-calculation of all reports Creation of „wish reports“ Functions to reduce all sales by a selectable amount while keeping reasonable items prices, quantities etc. The manufacturer can even provide special functions for data manipulation:

Problem Possibilities of manipulation (2) Problem Possibilities of manipulation (2)

Some, mostly smaller companies offer these functions and even promote them quite frankly

slide-6
SLIDE 6

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 6 Norbert Zisky 6

Modification of (unprotected) data on a PC-platform is technically impossible to detect (direct access to files or data-bases is possible) Unclear position of tax auditors concerning POS data stored on PCs Complete changeover to electronic reporting is a risk for users More and more customers use software for communication with POS systems. Problems:

Problem Communication software Problem Communication software

slide-7
SLIDE 7

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 7 Norbert Zisky 7

Solution Concept idea May 2004 Solution Concept idea May 2004

Finance authorities distribute signature devices and

  • perating instructions for ECR and POS

Finance authorities define sets of data to be signed and data structures Manufacturers integrate the signature devices to ECR and POS Tax audit starts with testing the integrity and plausibility of the tax data by verifying signatures Use of cryptographic mechanisms for the protection

  • f ECRs against manipulation
slide-8
SLIDE 8

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 8 Norbert Zisky 8

Solution Concept validation Solution Concept validation

The „Work group cash registers“ of the German Federal Ministry of Finance validates the concept

Modification of (unprotected) data on a PC-platform is technically impossible to detect (direct access to files or data-bases is possible) Approaches discussed by the work group: “Classic“ fiscal memory Recording of all transactions and data protection by digital signature “Classic“ fiscal memory was considered incomplete since only sums and not single receipts are stored This is why recording of all transactions (“electronic journal“) with digital signatures was proposed Concept of digital signatures proposed by PTB was recommended

slide-9
SLIDE 9

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 9 Norbert Zisky 9

Current situation in Germany Current situation in Germany

Concept was confirmed by federal authorities and

German federal countries (2006)

Draft of a law was published Lack of clarity/misgivings to technical feasibility Lack of clarity at costs Strong resistance came from business associations

slide-10
SLIDE 10

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 10 Norbert Zisky 10

But!!! But!!!

German cash register group has developed a well

founded professional concept (July 2008)

Under the leadership of PTB the project group

„INSIKA“ work out the technical detail specification; starts February 2008

All technical and general specifications will be open

for everyone after finishing according to detailed

  • perating schedule
slide-11
SLIDE 11

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 11 Norbert Zisky 11

Used Technique Used Technique

Basis of the solution are well known, tested and

standardised procedures of data protection

Mass production of main components leads to

favourable prices

No new technique is necessary

slide-12
SLIDE 12

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 12 Norbert Zisky 12

System architecture (easy model) System architecture (easy model)

Protection of ECR against manipulation

Central authority

tax auditor ECR

smart card smart card

cash entry set of data

Xx23434-362632| Xx23434-362632| 20031016_09:05| 20031016_09:05| 123.34|432.22|822.31| 123.34|432.22|822.31| 12343222 12343222 1ad3477ca123a2b3b4b77aa 22bc1ad3477ca123a2b3b4b

signature Store public key

read public key

Recruitment of cards card management, card delivery tax audit Sets of data generate sign store export

Server

  • r

Checking cash entry set

  • f data
slide-13
SLIDE 13

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 13 Norbert Zisky 13

System architecture (easy model) System architecture (easy model)

Life cycle

Central authority

tax auditor ECR

smart card smart card

cash entry set of data

Xx23434-362632| Xx23434-362632| 20031016_09:05| 20031016_09:05| 123.34|432.22|822.31| 123.34|432.22|822.31| 12343222 12343222 1ad3477ca123a2b3b4b77aa 22bc1ad3477ca123a2b3b4b

signature Store public key

read public key

Recruitment of cards card management, card delivery tax audit Sets of data generate sign store export

Server

  • r

Checking cash entry set

  • f data

Once every 10 years Once for 10 years Once within 10 years 1 kbyte for 20 years

slide-14
SLIDE 14

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 14 Norbert Zisky 14

Solution

slide-15
SLIDE 15

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 15 Norbert Zisky 15

Europe-wide cooperation of tax authorities Increased attention towards POS data during tax audits Better defined demands for POS systems, e.g.: Austria: New law (“Betrugsbekämpfungsgesetz”) The Netherlands: Brochure „Uw bedrijf en hetafrekensysteem“ Germany: Legislative procedure in progress Sweden: New law about cash registers Fiscal authorities have recognized the problems:

Solution Growing awareness Solution Growing awareness

slide-16
SLIDE 16

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 16 Norbert Zisky 16

Estimation Netherland Estimation Netherland

Ben van der Zwet, Belastingdienst.nl Feb.2008

In 2004 Dieter Paschmans introduced your work in the EU Fiscalis Cash Register Project Group. ..… Meanwhile Germany is working in the same direction and thanks to the Working Group for Cash Registers, I think Germany is way ahead of the Dutch project. In this way the outcome of your work would not only be applicable in Germany.

It might set a global standard.

slide-17
SLIDE 17

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 17 Norbert Zisky 17

EU Fiskalis 2013– cooperation between national tax authorities EU Fiskalis 2013– cooperation between national tax authorities

MEPs gave a first reading to the EU’s new programme to facilitate cooperation between national tax authorities over the next six years, Fiscalis 2013. They are proposing a number of changes aimed at enhancing transparency of the scheme, and also want to limit it to EU Member States, where the Commission was proposing to include countries participating in the EU’s Neighbourhood Policy too. The proposed budget for Fiscalis 2013 is around €157m

slide-18
SLIDE 18

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 18 Norbert Zisky 18

EU Fiscalis 2013– Greek proposal – Action Proposal 186 EU Fiscalis 2013– Greek proposal – Action Proposal 186

Title: Project Group for defining the tax reliable cash register

The following known solutions and approaches should be examined, evaluated and/or assessed: Fiscal memories Securing data via Electronic signatures Greece - Fiscal Electronic Signature Devices (FESD) German “Zisky”concept (obligatory?) Netherlands “Zisky” concept” (compliance driven) Use Trusted Third market parties, USA, Streamlined Sales and Use Tax Agreement (SSUTA) On-line data signing

slide-19
SLIDE 19

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 19 Norbert Zisky 19

Worldwide developments Worldwide developments

Richard Ainsworth, Boston University of law

ZAPPERS: TAX FRAUD, TECHNOLOGY AND TERRORIST FUNDING, WORKING PAPER NO. 08-07 ZAPPERS & PHANTOM-WARE: A GLOBAL DEMAND FOR TAX FRAUD TECHNOLOGY, Boston University School of Law Working Paper No. 08-20 A comprehensive approach seems to be favored by Germany, and is currently under development. Rather than use mini computers, the German preference is to require that smart cards be embedded in all ECRs to encrypt an record all transactions passing through the terminal. A comprehensive approach seems to be favored by Germany, and is currently under development. Rather than use mini computers, the German preference is to require that smart cards be embedded in all ECRs to encrypt an record all transactions passing through the terminal.

slide-20
SLIDE 20

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 20 Norbert Zisky 20

Compulsory recording of all transactions Electronic data access for tax auditors Protection against manipulation using digital signatures In case of data loss estimation possible using totalizers in smart card Simple basic idea: Using existing rules and procedures for POS systems completed by manipulation protection

Solution Basic idea Solution Basic idea

slide-21
SLIDE 21

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 21 Norbert Zisky 21

Main elements of the presented solution:

Technology Central points Technology Central points

Electronic journal Manipulation-proof through digital signature (smart card) Printed receipt can be verified by digital signature Evaluation of POS data with common instruments (software-based analysis of transactions) Totalizers in smart card contain information about total sales even if journal data gets lost Audits not relying on „traditional“ reports (like transaction report, PLU report etc.) Technically quite simple – no unnecessary high (and expensive) demands

slide-22
SLIDE 22

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 22 Norbert Zisky 22

Definition of useful minimum content (must be feasible in all POS systems and contain sufficient information for effective check) Evaluation without accessing other data (e.g. article data) must be possible No „brand-specific” knowledge required for evaluation of journal Backward compatibility – „new“ software must be able to work with „old“ data Important demands on electronic journal:

Technology Electronic journal Technology Electronic journal

slide-23
SLIDE 23

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 23 Norbert Zisky 23

“End to end” security – protection of data between the end points (from printing receipts to tax auditor’s software) No proprietary technology – security not based on keeping „technology secrets“ but on generally accepted mathematics Security of the system can be verified independently Today‘s algorithms have not been broken for many years Digital signatures have advantages over any other mechanism to protect data:

Technology Advantages of digital signatures Technology Advantages of digital signatures

slide-24
SLIDE 24

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 24 Norbert Zisky 24

Technology Receipt and cash slip Technology Receipt and cash slip

Data of receipt and cash slip are the same signature of receipt = signature of cash slip With the help of a receipt sequence number the assignment is possible clearly Receipt data can be stored durable on user-defined media electronically

slide-25
SLIDE 25

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 25 Norbert Zisky 25

Technology Receipt structure Technology Receipt structure

XYZ GmbH DE 188851765-2

  • 1 beer 0,5l A

2,50 1 wine 1 l A 5,00 Total 7,50

  • taxable. A=19%

6,30 VAT 19% 1,20 Cash 7,50 10.08.2008 14:38 34134 3a23cf11ff312288a121 55fe327ab21ecf791322

  • Thank you

Tax no. and consecutive ECR no. PLU bookings VAT Unambiguous receipt no. Signature Hash value for PLU bookings Red = special elements for „Fiscal receipts““

slide-26
SLIDE 26

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 26 Norbert Zisky 26

Technology Signature procedure (1) Technology Signature procedure (1)

XYZ GmbH DE 188851765-2

  • 1 beer 0,5l A

2,50 1 wine 1 l A 5,00 Total 7,50 taxable A=19% 6,30 VAT 19% 1,20 Cash 7,50 10.08.2008 14:38 34134 3a23cf11ff312288a121 55fe327ab21ecf791322

  • Thank you

1 1 piece piece wine 1 l beer 0,5l 5,00 19 2,50 19

Hash value PLU

  • 1. step:

Calculation of Hashcode for PLU bookings

slide-27
SLIDE 27

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 27 Norbert Zisky 27

Technology Signature procedure (2) Technology Signature procedure (2)

XYZ GmbH DE 188851765-2

  • 1 beer 0,5l A

2,50 1 wine 1 l A 5,00 Total 7,50 taxable A=19% 6,30 VAT 19% 1,20 Cash 7,50 10.08.2008 14:38 34134 3a23cf11ff312288a121 55fe327ab21ecf791322

  • Thank you

VAT reduced VAT normal sequence no. date and time Tax number Hash value PLU 6,30 / 1,20 (19%)

3a23cf11ff312288a121 DE 188851765-2

34134 0,0 / 0,0 (7%) 10.08.2008 14:38

  • 2. Step:

smart card computes the receipt signature

Receipt signature

slide-28
SLIDE 28

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 28 Norbert Zisky 28

Technology Signature procedure (2) Technology Signature procedure (2)

XYZ GmbH DE 188851765-2

  • 1 beer 0,5l A

2,50 1 wine 1 l A 5,00 Total 7,50 taxable A=19% 6,30 VAT 19% 1,20 Cash 7,50 10.08.2008 14:38 34134 3a23cf11ff312288a121 55fe327ab21ecf791322

  • Thank you

VAT reduced VAT normal sequence no. date and time Tax number Hash value PLU 6,30 / 1,20 (19%)

3a23cf11ff312288a121 DE 188851765-2

34134 0,0 / 0,0 (7%) 10.08.2008 14:38 Receipt signature

Check of authenticity possible through receipt signature using the data on cash slip

slide-29
SLIDE 29

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 29 Norbert Zisky 29

55fe327ab21ecf791322

22.122,33 sales delivery receipt 48.642,27 sales training 33.278,23 negative sales normal 10.404,96 Sales reduced ……… ……… 180.422,86 sales normal

Monthly totalizers

  • n smart card

signature

Technology Signature procedure (3) Technology Signature procedure (3)

VAT reduced VAT normal sequence no. date and time tax number hash value PLU 6,30 / 1,20 (19%)

3a23cf11ff312288a121 DE 188851765-2

34134 0,0 / 0,0 (7%) 10.08.2008 14:38

  • 3. step:

smart card refeshs totalizers

slide-30
SLIDE 30

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 30 Norbert Zisky 30

Allocation of new receipt no. Calculation of receipt signature Calculation of journal signature Update of totalizers The following procedures take place in one step within the smart card:

No manipulation (e.g. data modification and recalculation of signature) possible. The security is in the smart card and not depending on the POS system

Technology Signature procedure (4) Technology Signature procedure (4)

slide-31
SLIDE 31

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 31 Norbert Zisky 31

Technology Signature procedure (5) Technology Signature procedure (5)

VAT reduced VAT normal sequence no. date and time tax number hash value PLU 6,30 / 1,20 (19%)

3a23cf11ff312288a121 DE 188851765-2

34134 0,0 / 0,0 (7%) 10.08.2008 14:38 1,0,5,“beer“,2.50,A 1,1,0,“wine“,5.00,A 2,DE 188851765-2,200808101438,34134,6.30,1.20,0,0 3,55fe327ab21ecf791322

Storage of signed data in ECR: manufacturer specific!! No requirements!!!

slide-32
SLIDE 32

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 32 Norbert Zisky 32

Each set of totalizers records sales, voids, training transactions, VAT etc Memory of smart card allows multiple sets of totalizers proposal: 120 monthly totalizers for ten years since smart card distribution Each container holds 6 tax values Control elements against overflow Totalizers on smart card deliver data even if journal is lost ”Built-in back-up for most important data

Technology Totalizers Technology Totalizers

slide-33
SLIDE 33

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 33 Norbert Zisky 33

Periodic transmitting of data to an external media (memory card, USB stick, hard disk) Backup of daily statements by reading the totalizers of the smart card Backup of data on external PC Structured saving of data Well-defined access to data Conversion of data to testable format – export interface Requirements to ECR data processing after data acquisition :

Technology data processing Technology data processing

slide-34
SLIDE 34

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 34 Norbert Zisky 34

Daily statement contains the totalizers of the smart card in signed form In most cases a verification of each transaction signature (which takes some time for calculation) is not necessary if the sum of all transactions between two daily statements corresponds to the difference of the totalizers from the statements the number of transactions corresponds to the difference of the invoice number between two daily statements. Daily statements accelerate the verification of data

Technology Daily statements Technology Daily statements

slide-35
SLIDE 35

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 35 Norbert Zisky 35

Conversion to standard XML-export format Comparison of the sums of receipts with the daily statements Verification of the signature of daily statements If required: complete or random verification of signed transaction checking of printed receipts to recognize forgeries Steps for checking the journal data:

Technology Tax audit Technology Tax audit

slide-36
SLIDE 36

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 36 Norbert Zisky 36

Implementation

slide-37
SLIDE 37

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 37 Norbert Zisky 37

Implementation Changes at POS systems (1) Implementation Changes at POS systems (1)

Following changes in existing POS systems and back-office software are required:

POS-systems must be able to create the required electronic journal (must be “self-contained“: evaluation must be possible without access to any other data) Software for transfer to PC and for further processing must be made available for all users (low-cost-solution) If necessary memory extension for longer storage of data in the POS system might be needed (to work without frequent transfer of sales data to a PC)

POS systems comply with “good accounting practice”

slide-38
SLIDE 38

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 38 Norbert Zisky 38

Implementation Changes at POS systems (2) Implementation Changes at POS systems (2)

The digital signature only requires some minor additions:

Connection of external smart card reader or full integration

  • f card reader

Software features so that signatures be created, printed and stored Use of ECC („Elliptic Curve Cryptography“) proposed: Relatively short keys and signatures (112 to 192 bit keys and 224 to 384 bit signatures) Ideal for implementation in smart cards

Additional manipulation security

slide-39
SLIDE 39

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 39 Norbert Zisky 39

Implementation Expenditure for ECR manufacturers (1) Implementation Expenditure for ECR manufacturers (1)

Simple external smart card reader

Connection of external smart card reader or full integration Suitable especially for PC- based POS systems Single-unit end-user price less than € 25

slide-40
SLIDE 40

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 40 Norbert Zisky 40

Implementation Expenditure for ECR manufacturers (2) Implementation Expenditure for ECR manufacturers (2)

Card reader unit and controller approx 10 € Memory extension

  • approx. 5-10 €

Hardware Software Triggering of smart card Changing/Adoption of data bases Support of export interface Smart card (10 €)

slide-41
SLIDE 41

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 41 Norbert Zisky 41

Implementation Expenditure for ECR manufacturers (3) Implementation Expenditure for ECR manufacturers (3)

* Refer to 2000 ECRs produced

price per ECR* price item 10 000 € 10 000 € 30 000 € 5 € 10 € sum Software XML-export Software memory extension Software smart card triggering Hardware memory/interface Hardware card reader 5 € 10 € 5 € 5 € 40 € 15 €

slide-42
SLIDE 42

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 42 Norbert Zisky 42

Apply for smart card Assembly of smart card (once for 10 years) Backup system for ECR data (is not new) Keep ready data in export format Apply for smart card Assembly of smart card (once for 10 years) Backup system for ECR data (is not new) Keep ready data in export format

price per ECR price item 0 € 80 € 0 € 10 € 0 € sum Assembly smart card new system Assembly smart card re-fitting Data backup Price smart card Application 0 € 0 € 10 € 80 € 10 to 90 € 0 €

Implementation Expenditure for ECR user (1) Implementation Expenditure for ECR user (1)

slide-43
SLIDE 43

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 43 Norbert Zisky 43

Acquisition of smart cards (organisation of tender) Distribution of smart card, support of database (Germany up to 2 million ECR) Supply of certificates (LDAP server) ECR review of tax authority Field auditing of tax authority

Implementation Expenditure for tax authorities (1) Implementation Expenditure for tax authorities (1)

slide-44
SLIDE 44

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 44 Norbert Zisky 44

Extent of recording (what does a stored receipt have to contain?) Application fields (Who is obliged to record the data? Are POS systems compulsory?) Precise definition of manipulation security as concretesolution based on smart cards

Implementation Required standardisation Implementation Required standardisation

Required standardization to avoid insecurity, distorted competition and security holes

slide-45
SLIDE 45

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 45 Norbert Zisky 45

General structure working well for „fiscal journal“ Digital signatures have to added Definition of compulsory fields required Minor details have to be discussed (characters sets etc.)

Implementation XML export file Implementation XML export file

XML export File is suitable for data exchange

slide-46
SLIDE 46

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 46 Norbert Zisky 46

General structure working well for „fiscal journal“ Public keys are usually stored in “certificates”:Identity of person or institution that signed the data can be verified Identity of certificate issuer can be verified Integrity of key data can be verified Mechanism to revoke certificates If smart cards are issued by tax authorities and public keys are distributed and used within the organization the system can be simplified significantly „Certificate servers“ operated by any private organization are an alternative approach

Implementation Public key infrastructure (PKI) Implementation Public key infrastructure (PKI)

Digital signature systems require “Public Key Infrastructure”

slide-47
SLIDE 47

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 47 Norbert Zisky 47

Security analysis Data modelling Description of interfaces ECR to signature device Description of interfaces XML export Audit and verification activities

Actual development status of the specifications Actual development status of the specifications

slide-48
SLIDE 48

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 48 Norbert Zisky 48

System interfaces System interfaces

Cash register Cash register TIM TIM Data export Data export

XML-export format XML-export format TIM-interface TIM-interface

slide-49
SLIDE 49

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 49 Norbert Zisky 49

Model of totals inside TIM Model of totals inside TIM

Monat n

Monat 1

Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 6 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 6 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 5 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 5 Flag Umsatzsteuer- satzwechsel (1 Bit) Flag Überlauf (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 4 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 4 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 3 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 3 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 2 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Gesamt- speicher 2 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Container 1 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatzsteuersatz (2 Byte BCD) Umsatz (8 Byte BCD) Negativumsatz (8 Byte BCD) Container 1 Flag Umsatzsteuer- satzwechsel (1 Bit) Umsatz (8 Byte BCD) Buchungszähler (4 Byte BCD) Container Agenturgeschäft Umsatz (8 Byte BCD) Buchungszähler (4 Byte BCD) Container Lieferschein Umsatz (8 Byte BCD) Buchungszähler (4 Byte BCD) Container Lieferschein Umsatz (8 Byte BCD) Buchungszähler (4 Byte BCD) Container Training Umsatz (8 Byte BCD) Buchungszähler (4 Byte BCD) Container Training Flag Überlauf (1 Bit)

month 1 month 1 totals and flags totals and flags training and flags training and flags

slide-50
SLIDE 50

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 50 Norbert Zisky 50

Important dates of INSIKA-Project Important dates of INSIKA-Project

08/2008 Specification of signature device 09/2008 Prototype of signature device 09/2008 Specification XML export 10/2008 Prototypes cash registers 10/2008 Start of test 10/2008 Publication of specification (Workshop, Internet) 08/2008 Specification of signature device 09/2008 Prototype of signature device 09/2008 Specification XML export 10/2008 Prototypes cash registers 10/2008 Start of test 10/2008 Publication of specification (Workshop, Internet)

slide-51
SLIDE 51

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 51 Norbert Zisky 51

General structure working well for „fiscal journal“ Absolute tamper-proof POS data – “end to end” security Data files instead of paper rolls Automated verification possible – saving a lot of time Authenticity check of paper receipts easily possible Upgrade of old systems possible in most cases and relatively inexpensive Data is secured cryptographically and not physically – Remote data transfer, E-Mail etc. easily possible Central data management is possible in chain-operations – no visit of each outlet required during tax audit

Conclusion Advantages of the system Conclusion Advantages of the system

Main advantages of the system

slide-52
SLIDE 52

Buenos Aires, SIM Buenos Aires, SIM-

  • CENAM, 28.08.2008

CENAM, 28.08.2008 Norbert Zisky 52 Norbert Zisky 52

Many Thanks for Your Attention!