WASP Application note #1 1 WASP (Web Activated Signature Protocol) Application Note #1 – Signature Validation and Multiple Signatures WASP was designed.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
2013 Texas Ad Astra Summit Monday, July 22 nd What’s New in 7.5 for Event Scheduling Presented by: Kelly Hollowell, Manager of Education, Ad Astra.
PKI Implementation in the Real World
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
E.halFILE Overview Session V. What is e.halFILE? Thin client, browser-based Brings halFILE documents to the Internet / Intranet No publishing required.
Request Material Information Use Case Item as created in Optiva. Supplier information request(s) can happen at any time. The same process works for Optiva.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Robustness Analysis Dr. Neal CIS 480. Outline What is robustness analysis? Key roles in robustness analysis Object types found in discovery Diagramming.
HTTP Hypertext Transfer Protocol. HTTP messages HTTP is the language that web clients and web servers use to talk to each other –HTTP is largely “under.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Engineering Document Repository & Electronic Signature (E-Sign) Tutorial 1 DCG- Revision C 7/25/2014.
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
XP New Perspectives on Microsoft Access 2002 Tutorial 71 Microsoft Access 2002 Tutorial 7 – Integrating Access With the Web and With Other Programs.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
FCC Registration Number (FRN) Phase I Enhancements Online FRN Password Reset and ULS FRN Association FCC Commission Meeting Room Washington, D.C. September.
The Electronic Transaction Getting Paperless signatures with zipLogix Digital Ink®
zipLogix ® Digital Ink Training Sending files to be signed using the new zipForm ® Plus Go Beyond.
Course 201 – Administration, Content Inspection and SSL VPN
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
T U T O R I A L  2009 Pearson Education, Inc. All rights reserved Bookstore Web Application Introducing Visual Web Developer 2008 Express and the.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Tutorial 1 Getting Started with Adobe Dreamweaver CS3
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 8 Cookies And Security JavaScript, Third Edition.
Activating Clarity  Activating Clarity  Activation  Online Activation  Fax Activation  Review and Verify Activation and License Terms  Updating.
Unit 1: Protection and Security for Grid Computing Part 2
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
ITEC 1001 Tutorial 1 Browser and Basics. Web browser software & Web pages The Web is a collection of files that reside on computers, called Web.
Document/Invoice Management Version 4.2 This easily configured application creates a centralized database for all your company records with notification.
1 ADVANCED MICROSOFT WORD Lesson 14 – Editing in Workgroups Microsoft Office 2003: Advanced.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
The Intranet.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Creating and Managing Digital Certificates Chapter Eleven.
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CSCI-235 Micro-Computers in Science The Internet and World Wide Web.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
Digital Signatures and Digital Certificates Monil Adhikari.
Introduction to Active Directory
WASP Application note #2 1 WASP (Web Activated Signature Protocol) Application Note #2 – Signature container considerations WASP was designed to support.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
SDA Formulas Online Webinar Please use the mute button or press #6 on your phones to mute the teleconference line If you have questions or technical problems.
Setting and Upload Products
The Intranet.
Digital Certificates and X.509
Tutorial 7 – Integrating Access With the Web and With Other Programs
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
Presentation transcript:

WASP Application note #1 1 WASP (Web Activated Signature Protocol) Application Note #1 – Signature Validation and Multiple Signatures WASP was designed to be a “thin client” browser add-in. This among many things, excluded local signature validation. The major reason for that is that in an information system environment (which is the sole target for WASP), a validation server can perform the validation once (typically immediately after the receival of a signature), and save the result in a database table for future references. This scheme is also a prerequisite for Identrus-style (“pay-per-view”) certificates as such certificates cannot easily be validated locally due to trust network specific validation software and contracts. A further advantage with off-loading validation exclusively to the information system layer, is that you can avoid warnings due to expired certificates when looking at old signatures, as you rather return the result of the original validation rather than repeating it. The need for end-users to study, or even know what a “certification path” is, seems marginal. In addition, the information system approach eliminates the need to download root certificates for other persons´ certificates making the user’s private keys and certificates the only required local unique resource. Signatures are always detached using WASP due to the reasons listed on page 3. The following pages show how an information system can cope with user display of signatures, as well as supporting multiple signatures, giving users an almost “PKI-free” world in spite of actually using PKI. V0.8, © 2004 by Anders Rundgren

WASP Application note #1 2 Company Registration/Update Form Current user:John Smith First name: John Last name: Smith Citizen code: Address: etc. etc First name: John Last name: Smith Citizen code: Address: etc. etc Company file:ACME Corporation, Shows the current company file Show history… To list of previous filings Currently signed by:Mary Donahue, Steve Miller Signed: 10-Nov :32 First name: Mary Last name: Donahue Citizen code: Address: etc. etc Signed: 10-Nov :32 First name: Mary Last name: Donahue Citizen code: Address: etc. etc Optional: Certificates etc. Missing signatures:John Smith, Yoki Masaki Revise company file… Sign company file… Pop-up window Send request via First name: Yoki Last name: Masaki Citizen code: Address: etc. etc Send request via First name: Yoki Last name: Masaki Citizen code: Address: etc. etc To company registration wizard. Removes previous signatures To signature application (WASP). Shows the completed company file and requests a signature. Returns to this view after the signature has been performed or is cancelled Replaces current window John SmithHyperlink File status: Updated, awaiting signatures Help WASP Workflow application sample

WASP Application note #1 3 Signature A The information system approach to multiple signatures: A document and a set of associated detached signatures The primary advantage with this scheme (besides not having to download and process signatures of other signers in the client environment), is that documents are not “clobbered” with signature data. Signatures and WASP SignatureRequest (or view transform) objects are typically stored in separate database tables (which also enables a straightforward way of adding digital signatures to existing systems). The relation between signers with respect to authority then becomes an information system issue only, not requiring any specific code on the client side in order to differentiate between an authorization “counter signature” and a “peer signature”. This makes sense as a “genuine” counter signature (like in CMS), in itself does not have any specified semantics like that the outermost signature is the most authorized etc. Original document or transaction to sign Signature B Signature C SignatureRequest or view transform object