/
20 February 2013 20 February 2013

20 February 2013 - PowerPoint Presentation

lindy-dunigan
lindy-dunigan . @lindy-dunigan
Follow
414 views
Uploaded On 2015-11-22

20 February 2013 - PPT Presentation

Ignacio Boixo CENWS XBRL CWA2 Page 1 CWA2 Hot topics of interest in 2nd level reporting Hot topics of interest in 2 nd level reporting Workflow on 2 nd level reporting Proof of concept email validation ID: 201779

itemprimary primary page item primary itemprimary item page table instance identifier entity legal authority key encryption signature geographic alternative

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "20 February 2013" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

20 February 2013Ignacio Boixo

CEN/WS XBRL

CWA2

Page

1

CWA2:

Hot topics of interest in 2nd level reportingSlide2

Hot topics of interest in 2nd level reportingWorkflow on 2nd level reportingProof of concept e-mail validationCore Business Vocabulary

Legal Entity IdentifierAny other Business?

Page 2Slide3

Requirement: example workflow

Submission container

Declarer

header.xml

nationalinstance1.xbrl

nationalinstance2.xbrl

Signature (and encryption)

via National

regulator public certificate

Signature (and encryption)

using

European regulator

public certificate

Subcontainer

Subcontainer

National

Supervision

Authority

European

Supervision

Authority

Page

3Slide4

Page 4

Signature 1 (contributor 1 - private key)

Encryption (public key of the

first addressee

)

Zip

Header

Instance 1, Instance 2, …,

Instance n

Signature 2 (contributor 2 - private key)

Zip

Header

Instance 1, Instance 2, …,

Instance n

National

Supervision

Authority

Alternative A:

Signature

encapsulated

Signature 3 (contributor 3 key)

Zip

Header

Instance 1, Instance 2, …,

Instance n

Signature/ Encryption

(

addressee

certificate

)

& transfer

Other

Authority:

e.g. EBA

Other

Authority:

BIS / ESRB /

Banking

Union / …

transfer

Encryption (public key

2

nd

addressee

) Slide5

Page 5

Signature 1 (contributor 1 - private key)

Encryption (public key of the

first addressee

)

Zip

Header

Instance 1

Instance 2

...

Instance n

SignedSubContainers

XadesSignedSubcontainer.xml

signed with contributor 2 private key

Inside, zip file with a new Header, Instance 1, Instance 2, …, Instance n.

FullSubContainers

EncryptedSubcontainer.xml

public key

2

nd addressee

signed with contributor 3 private keyInside the signed, zip file with a new Header, Instance 1, Instance 2, …, Instance n.

National

Supervision

Authority

Alternative

Z:

Zip-encapsulated

Encryption (next addressee) & transferOther Authority:

e.g. EBA

Other

Authority:

BIS / ESRB /

Banking

Union / …

Transfer

onlySlide6

CharacteristicsAlternatives are functionally equivalent: both provide Xades-signed sub-containers for trusting authorities Fully encrypted subcontainers for non-trusting authorities

Both alternatives can deliver as a result a set of files using a generic decomposition toolFor Alternative 1, the result file set will be a flat set of files having their original filenamesFor Alternative 2, the result file set will be a hierarchical set of files (in accordance with the folder hierarchy defined in the .zip container, both folders and files having their original name)

Problem : How shall the NSA identify the final

recipients of the subpackages (EBA, Banking union, etc)?For Alternative 1, the addressee

of the subcontainer has to be identified using a non-standard xml tag (requiring thus an intermediate xml schema which is not standard?) For Alternative 2, a file naming convention would be required in the instructions of the NSA to identify the addressee of the subpackage

Page 6Slide7

Proof of concept e-mail validationPage 7

Anonymous

Eurofiling

Test

V

alidator (Arelle)

Signature (XADES-EPES)

Encryption (XML Encryption)

Zip

Instance-1

Instance

-n

Package & Compress (zip)

Signature (XADES-EPES)

Feedback

instance1.xml

instance2.xml

instancen.xml

Encryption (XML Encryption)Slide8

Page 8

http://joinup.ec.europa.eu/asset/core_business/descriptionSlide9

Page 9Slide10

Page 10Slide11

Page 11TABLE 1. Legal Entity-Names

TABLE 2. Legal Entity-Identifier

TABLE 3. Legal Entity-Code

TABLE 4. Person-Names

TABLE 5. Person-Identifier

TABLE 6. Person-LocationTABLE 7. Legal Entity-Address

TABLE 8. Location-Address

TABLE 9. Location-Geometry

TABLE 10. Location-Geometry (alternative representation)

In yellow, the primary key of the table, usually an unique value, not to be repeated (see notes on Tables 1, 4 and 6). Slide12

TABLE 1. Legal Entity-Names

Typed Dimension

Primary Item

Legal name

Alternative name

Note: Legal name as

primary

key would be duplicated is several

alternative

names exist. This is NOT an issue in XBRL. In RDBMS, both

jointly

are the primary key.

 

 

 

 

 

 

 

 

 

 

TABLE 2. Legal Entity-Identification

Legal Entity - Identifier

Primary Item

Primary Item

Typed Dimension

Typed Dimension

Primary Item

Primary Item

Legal name

Issuing authority

(name)

Issuing authority URI

Identifier

Identifier type

Date of issue

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE 3. Legal Entity-Code

Company

activity

Company Status

Company type

Typed Dimension

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Legal name

Content

List

List agency

List version

Content

List

List agency

List version

Content

List

List agency

List version

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

               

Page

12Slide13

Page 13

TABLE 4. Person-Names

Residency

citizenship

Typed Dimension

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Full name

Family name

Given name

Patronymic name

Alternative name

Gender

(closed list)

Birth Name

Date of birth

Date of death

name

id: URI

name

id: URI

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE 5. Person-Identifier

Legal Entity - Identifier

Primary Item

Primary Item

Typed Dimension

Typed Dimension

Primary Item

Primary Item

Full name

Issuing authority

(name)

Issuing authority URI

Identifier

Identifier type

Date of issue

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE 6. Person-Location

Country of birth

Place of birth

Country of death

Place of death

Typed Dimension

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Full name

Geographic name

Geographic

identifier: URI

Geographic name

Geographic

identifier: URI

Geographic name

Geographic

identifier: URI

Geographic name

Geographic

identifier: URI                             

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Note: Full name (i.e. "John Smith") is prone to be duplicated. This is an inherent issue of the Core Person Vocabulary. Disambiguation to be solved (hopefully) by adding

something

(to be investigated) to the Full name.Slide14

Page 14

TABLE 7. Legal Entity-Address

Typed Dimension

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Legal name

Full address

PO Box

Thoroughfare

Locator designator

Locator name

Address area

Post name

Admin Unit L1

Admin Unit L2

Post Code

Address ID

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE 8. Location-Address

Typed Dimension

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Primary Item

Geographic identifier

Full address

PO Box

Thoroughfare

Locator designator

Locator name

Address area

Post name

Admin Unit L1

Admin Unit L2

Post code

Address ID

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

                       TABLE 9. Location-GeometryTABLE 10. Location-Geometry (alternative representation)Typed DimensionPrimary ItemPrimary ItemPrimary ItemPrimary ItemTyped DimensionPrimary ItemPrimary ItemPrimary ItemGeographic identifierWKTLatLongXML geometryGeographic identifierCoordinatesCRSGeometry type                                

 

 

 

 

 

 

 

 

 

 

 

 

 Slide15

Page 15Legal Entity Identifier and mapping to Core Business VocabularySlide16

Page 16Legal Entity IdentifierSlide17

Page 17Legal Entity IdentifierSlide18

Page 18http://www.dtcc.com/downloads/news/CiCi_Report.pdfSlide19

Page 19http://www.dtcc.com/downloads/news/CiCi_Report.pdfSlide20

Page 20http://www.dtcc.com/downloads/news/CiCi_Report.pdfSlide21

Page 21Thanks for your attention

Comments or questions?

boixo@bde.es

(as back up of emile.bartole@cssf.lu)