WO2014077698A1 - Signature porting - Google Patents

Signature porting Download PDF

Info

Publication number
WO2014077698A1
WO2014077698A1 PCT/NO2013/050198 NO2013050198W WO2014077698A1 WO 2014077698 A1 WO2014077698 A1 WO 2014077698A1 NO 2013050198 W NO2013050198 W NO 2013050198W WO 2014077698 A1 WO2014077698 A1 WO 2014077698A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature
document
signing
user
pki
Prior art date
Application number
PCT/NO2013/050198
Other languages
French (fr)
Inventor
Liana Gyulzadyan SVENDSEN
Original Assignee
Maestro Soft As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maestro Soft As filed Critical Maestro Soft As
Publication of WO2014077698A1 publication Critical patent/WO2014077698A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)
  • Document Processing Apparatus (AREA)

Abstract

A method for digital signing of documents is provided. This is provided by a signature porting system which extracts signature from a signed document and ports the extracted signature to a prepared document. This enables multi signing of a document.

Description

SIGNATURE PORTING
Background of the Invention Technical Field
The invention relates to digital signing in general and more specifically a system and a method for digital signing of documents with electronic identification systems.
Background Art
The following abbreviations of the art will be used:
Figure imgf000002_0001
Existing providers of PKI have their own PKI solutions wherein a digital signature can be returned in different signature packaging formats. For instance it can be a CMS signature based on PKCS#7, CMS signature based on ETSI CAdES-BES, XML signature formatted in SEID SDO
(http://www.npt.no/ikbViewer/Content/44963/SEID_Leveranse_3_v1 .0.pdf) or Adobe PDF signature. In order to read information regarding signature and view the specific documents that is signed some of these formats require a proprietary reading tool. It is therefore desired to support signing in the Adobe PDF format which is a commonly available format today where both signature and document can be shown in Adobe PDF Viewer, which is commonly available, also world wide. In 2009 ETSI developed profiles for PAdES documents, meeting requirements from the European directive 1999/93/EC (European Directive on A Community Framework for Digital Signatures).
The physical location of the private key itself and the certificate can also form part of the requirements such as the certificate and the private key having to be physically with the user. In this respect it should be referred BankID wherein the certificate and the private key is in fact not with the user but instead with the bank. Other solutions such as Buypass provide the certificate in the chip that the user holds.
From the known art one should refer to the following technologies: Cryptographic Service Providers
http : //msdn . mi c rosof t . com/en-us/1 i b ra ry/aa380245 . aspx
Using this technology one can achieve desired functionality. However the weakness is the need to install third party software at the user or configuration of existing framework. This is not a viable since there is for instance no guarantee that the solution will have sufficient privileges to modify the configuration locally at the user. At the same time there can be limitations relating to the fact that not all
implementations of the client software support lookup in public registers for verification of user certificates. Digital Signing Using PKI
This solution provides the possibility of digital signing with PKI, nevertheless this comes with several problems attached such as PKI service providers having different implementations of the infrastructure. This results in difficulties in obtaining desired end result in the desired format as well as limitations in multi signing of the same document with different electronic identities (e-ID).
From prior art one should also refer to the Masters Degree thesis titled "Advanced Electronic Signature" by Azizi, Fazel Ahmad, published June 201 1 , Norwegian University of Science and Technology, Department of Telematics. This regards electronic signature with proxy-signature. A method is disclosed where one signs on behalf of a user with other keys that are calculated based on the user's keys. Since the solution discloses a signature creation system signing using a trusted copy or derived key of the user's private key the solution acts as a trusted third party and entrusted with keys (key ring). The documents discloses different methods for transmitting private or calculated keys to a key holder (key ring) but does not disclose a porting of the signature after having been applied in the signature creation system.
There is therefore a need for a solution that overcomes the above problems. Disclosure of the Invention
A main objective of the invention is to provide a solution where one arrives at a system and a method for digital signing of documents with electronic identification systems. It is also an objective to arrive at a system and a method for providing a PAdES signature having basis in a CMS, SDO, XML based signature. Furthermore it is an objective to enable a plurality of signatories with different PKI solutions on signing the same document.
Problems to be Solved by the Invention
Therefore, a main objective of the present invention is to provide a method for making a system where one can sign a PDF document in a proprietary signature format supported by a given PKI vendor yet still be able to extract the signature at a later point in time and create a valid PAdES compatible signature. Original signature can be CMS, SDO or XML-based, and in order to view both data having been signed and information on who has signed and other information on signatory is it in some cases necessary to use online services or external viewing application that is not widespread. For this reason it has been a desire to be able to generate a PAdES- document in order to be able to display the signed document and details about the signatories in Adobe Viewer. The problem was that the PKI vendors either did not support signatures in PDF-file or they supported only a limited profile of PDF signature making it impossible to use their PDF signing services. There has also been a desire to be able to multi sign a PDF file with a plurality of signatories where these can use several different PKI solutions. This was impossible since the different PKI solutions returned signatures in different file formats. For some PKI solutions the user possesses his private key and certificate while in the other PKI solutions both private key and the certificate are stored with an approved trusted third party (TTP). This has caused problems since normal process for storage of digital signature requires that the signatory has access to his private key and signature. It is therefore impossible for the user to use CSP (Cryptographic Service Provider) to sign the document in the format he desires. Instead the document or a has of the content of the document is transmitted to the PKI vendor who, using several security factors, acquires the user's private key and create a signature over the content (as well as signature over a few other parameters). When the signature over the document is created it is based on a hash of the contents of the PDF file. This means that including signature fields into the original PDF file will change the later hash of the file and make the signature not valid.
Means for Solving the Problems
The objective is achieved according to the invention by a method for digital signing of documents as defined in the preamble of claim 1 , having the features of the characterising portion of claim 1 .
The objective is achieved according to the invention by a method for digital multi signing of documents as defined in the preamble of claim 3, having the features of the characterising portion of claim 3.
A number of non-exhaustive embodiments, variants or alternatives of the invention are defined by the dependent claims.
The present invention attains the above-described objective by a system for signature porting that extracts signature from a signed document and ports the extracted signature for a prepared document.
Effects of the Invention
The technical differences over existing PKI solutions is that the present invention provides signing of documents such as PDF documents using extraction of received signature from signing from PKI and porting of said signature in order to sign the document in desired format.
The technical differences over the above Master Degree thesis is that in the present invention the user signs using the users' or signatory's own key.
These effects provide in turn several further advantageous effects: it makes it possible to sign a PDF document in desired PAdES or other PDF signature format, even if the PKI vendor does not directly support this, and
multi signing of a PDF document with signatories that each can use different PKI solutions.
The invention provides a method where one has found a method wherein one by sending extra data together with the PDF document is able to retrieve signature based on a hash of the PDF document with signing fields that are signed later.
If the main certificate chain is available either by OCSP lookup or by physically accessible root certificates one can also construct a valid LTV signature. At the same time a time stamp is added from Time Stamping Authority.
The method also solves the problem of multiple signatures since by sending the PDF document to the different PKI solutions in sequence provides a PDF document with several signatures.
Brief Description of the Drawings
The invention will be further described below in connection with exemplary embodiments which are schematically shown in the drawings, wherein:
Fig. 1 shows the information flow in a signature system based on the solution.
Fig. 2 shows an example of multi signing of a document by 2 users with 2 different PKI solutions.
Fig. 3 shows schematically the structure of a signed PDF document.
Description of the Reference Signs
The following reference numbers and signs refer to the drawings:
100 Signature system
200 User
210 Original PDF document
21 1 Uploading of original PDF document to Signature porting system
220 Smartcard, OTP generator, pin codes or password.
221 The user authenticates himself with password, pin codes, etc.
230 Digitally signed PAdES PDF document 300 Signature porting system
31 1 Prepare PDF document and ready it for PKI signing
312 Prepared document.
313 Send request for signing to PKI.
315 Send prepared document for completion of signature.
320 Digital signature in for instance SDO, CMS, PKS#7, XML or other formats
321 Extract signature from received signed document.
330 Port the signature to the PDF document
331 Connect to TSA for time stamping
332 Make OCSP lookup
333 Complete signing and generate PAdES document with LTV
400 Public Key Infrastructure
410 PKI solution's store of certificates and optional keys.
41 1 PKI solution signs document with private key and certificate.
412 Submission of signature based on User's private keys to signature porting system.
413 Request from PKI for authentication.
101 Multi signature system
1200 User_1
2200 User_2
1300 Multi signature porting system.
1400 Public Key Infrastructure which User_1 is to use for signing (PKM )
2400 Public Key Infrastructure which User_2 is to use for signing (PKI_2)
1212 User_1 interaction with systems (such as preparing hardware for authentication, entering password, pin codes)
1213 User_1 authenticates himself with pass word, pin codes.
1401 PKM transmits request to User_1 for authentication
1402 Transmission of signature based on User_1 private keys to Signature porting system.
1340 Processing of signatures and documents from User_1 and PKM
1342 Signature porting system transmits request to PKM for signature
1343 Completion and storing of PDF document with signature from User_1
1230 PDF document signed by User_1
2212 User_2 interaction with systems (such as preparing hardware for authentication, entering password, pin codes) 2213 User_2 authenticates himself with password, pin codes.
2340 Processing of documents and signatures from User_2 and PKI_2
2342 Signature porting system transmits request to PKI_2 for signature
2401 PKM transmits request to User_1 for authentication
2402 Transmission of signature based on User_2 private keys to Signature porting system.
2343 Completion and storing of PDF document with signature from User_1 and User_2
12230 PDF document signed by User_1 and User_2
1344 Downloading of PDF document having two signatures to User_1
2344 Downloading of PDF document having two signatures to User_2
102 Details on signed PDF document
500 Structure in signed PDF document
510 Contents
51 1 Certificate
512 Signed message digest
513 Time stamp
Detailed Description
The invention will be further described in connection with exemplary embodiments which are schematically shown in the drawings, wherein:
Fig. 1 shows schematically a signature system with an interaction between a user, a signature porting system, and a PKI, and
Fig. 2 shows schematically the structure of a signed PDF document signed according to the invention. Principles forming the basis of the invention
If a data object or a file is signed with a qualified electronic signature then also every copy will be valid signed issues. A qualified electronic signature is attached to the data object through a cryptographic algorithm in such a way that the signature does not validate if the data object is changed. The idea behind the invention is however that a qualified electronic signature can be detached from its signature object and used to apply a valid signature on a copy of the signature object in another signature encapsulation format. This signature porting can be performed without involving signatories, certificate authorities. Depending on the formats that are converted to and from there will be a need to specify certain basic requirements that the original signature will have to support such as algorithm for calculating hash etc.
Best Modes of Carrying Out the Invention
The embodiment of the apparatus according to the invention shown in Fig. 1 and 2 comprises system with a signature and system with a plurality of signatures on the same document, also known as multi signature system.
It is desirable to use BankID and Buypass PKI to sign PDF in PAdES format. Initially we will support PAdES, part IV LTV profile (Long Term Validation) but also other formats can be implemented.
At the present time, however, BankID does not support signing of PDF in Adobe PDF format but can return a SEID SDO file (encapsulation format). The present invention for signature porting overcomes this problem by porting the signatures from SDO to the PAdES format.
The Buypass PKI provider has limited support for PDF signing, with limitations in file size, as well as missing support for full PAdES LTV format. The Buypass PKI provider nevertheless supports the CMS CADES-BES format, and the present invention therefore enables PAdES signature of PDF documents by porting the signature from the CMS CADES-BES to the PAdES format for PDF documents of any size. Generally it is possible to port such a signature provided that:
1 . PKI provider can return a PKCS#7-compatible signature blob (CMS or CADES-BES) over data or hash of data.
2. PKI provider can process data or hash without coding or decoding or any other changes of data.
3. It is desirable that PKI provider includes all validation information (certificates, CRL and OCSP response) that are required in order to generate a long term validation of all involved certificate chains. This includes main certificate chain from the certificate which is used to signing the root certificate. Moreover it is desirable to have a chain of certificates for providers of validation information (OSCP services, CRL issuers and TSA) included.
4. If PKI providers do not include all necessary information for validations then this information must be possible to acquire by other means (such as via online services). All missing validation information must be available either in the form of certificates offline or via online services (CRL).
Fig. 1 shows the information flow in a signature system 100 having only a single user with corresponding equipment, preferably co-located, 200 signing a document 210. The user commences the process by uploading 21 1 of the document 210 to the signature porting system 300.
The signature porting system 300 comprises a plurality of components that can be co-located and which in a typical embodiment are not with the user. In the signature porting system the received document 210 is pre processed and prepared for signing 31 1 and stored or temporarily stored as a pre processed document 312 and is transmitted to two different routes in the system. In a first route the document is transmitted 313 as a request for signing to Public Key Infrastructure, commonly abbreviated as PKI 400, and comprises a plurality of sub systems. Amongst these is the PKI solution's storage of certificates and optionally keys 410. This requires authentication so a request for authentication 41 1 is transmitted to the user 200, which uses Smartcard, OTP generator, pin codes or password 220 for this. The response is that the user authenticates himself 221 with password, pin codes etc. to PKI 400 in such a way that the PKI solution signs the document with a private key and certificate 41 1 . Next the transmission 412 of signature based on user's private keys to the signature porting system 300 which then creates a digital signature 320 in for instance SDO, CMS, PKS#7, XML or other formats. Then signature is extracted 321 from the received file and is transmitted to a unit for porting 330 of the signature to the PDF document.
In a second route the prepared document is transmitted 315 to the unit for porting 330 of the signature to the PDF document. In this process signed message digest is extracted from the document received from PKI and is attached to the prepared PDF document for completion of signature. In this phase time stamp from TSA and OSCP-lookup is missing.
From the unit for porting the process proceeds to a unit 331 for connection to Time Stamping Authority, usually abbreviated TSA, for time stamping, and then to a unit 332 for generating Online Certificate Status Protocol, frequently called OCSP, lookup. TSA provides time from independent trusted third party from for instance atomic clock. The time stamp can be verified and provides necessary proof of time of signing. OSCP lookup is made in order to verify validity of a user certificate at the time of signing. If for instance the certificate is expired or locked, the signing process will have to be interrupted. Additionally LTV signature is generated wherein validation data (CA certificates, OSCP lookup or CRL) are stored together with the document in order to make it possible for later validation of digital signature.
Finally in the signature porting system this is sent to a unit 333 for completion of signing and making PAdES document with LTV and which returns to the user a digitally signed PAdES PDF document 230.
Fig. 2 shows schematically an example 101 of multi signing of a document of two users comprising a first user 1200 and a second user 2200 having two different PKI solutions. Each user comprises equipment preferably co-located with each user, while each user can be located separately.
In this example the PDF document is signed preferably first by User_1 1200, then by User_2 2200.
User_1 1200 uploads the PDF document 210 to the multi signature porting system 1300. Next the document is processed in 1340 making document that is transmitted 1342 to signing in PKI system 1400. The PKI system requires authentication 1401 from User_1 . User_1 prepares necessary hardware for authentication (chips, smartcard) 1212 and authenticates himself 1213 with OTP, pin codes, password. Based on this signature is generated and transmitted back 1402 to the multi signature porting system 1300.
The signing process is completed in 1343 by contacting OSCP and TSA servers and is stored as PAdES document with LTV 1230. Next this document is prepared in 2340 for preparing for signing by User_2 2200. User_2 can have access to a different PKI solution 2400. The document that is prepared in 2340 is transmitted 2342 to PKI system 2400 for signing. User_2 receives request 2401 for
authentication, prepares smartcard, chips 2212 and authenticates himself 2213 using pin codes, OTP or password. PKI 2400 generates digital signature.
When the signature is transmitted back 2402 to the multiple signature system 1300 the signature process is completed in 2343 by porting signature as well as making lookup to OSCP and TSA server and time stamping for storing PAdES LTV signature. The signed document 12230 is stored ready for download. In the end the document 12230 having signatures from both users can be downloaded 1344 by User_1 for local storage 1344 and downloaded 2344 by User_2 for local storage.
User_1 has signed the original document while User_2 has signed the original document with a signature from User_1 .
Note that the multi signing takes place by chaining together a process. In the above example it is the transmission 1343 that connects the signature process from User_1 together with the signature process for User_2. It is therefore possible to extend the process to more than two users by continuing the chaining. Such a chain typically comprises
a start wherein the first user uploads a document to be signed,
a signing from each user, and
a completion wherein the document is assembled and transmitted to each who is to receive the document.
Typically the receivers are the same as those who signed the document.
Fig. 3 shows schematically a structure 500 of a signed PDF document comprising content 510, a certificate 51 1 , a signed message digest 512, and a time stamp 513.
Alternative Embodiments
A number of variations on the above can be envisaged. For instance the signature porting system enables signature porting as long as there is algorithmic compatibility between the formats.
One can also imagine making parts of the signature generation offline, for instance as long as one keeps private keys and then adding other information available online in order to meet the standards. Industrial Applicability
The invention according to the application finds use in digital signing of documents.

Claims

Claims
1 . A method for digital signing of documents (210) by a user (200) comprising steps:
reception (21 1 ) of a document (210),
preparation for signing (31 1 ) and storing or temporarily storing as a prepared document (312),
transmission (313) of the prepared document as request for signing to PKI, reception (412) of signature from PKI,
generation of a digital signature (320),
extraction (321 ) of signature from received signature from PKI and
transmission to a unit for porting (330) of the signature,
transmission (315) of the prepared document for completion of signature to the unit for porting (330) of the signature to the document,
time stamping (331 ),
lookup to create OCSP (332),
completion of signing (333), and
returning of signed document (230),
characterised in that the user (200) signs with own private key.
2. The method according to claim 1 , wherein the completion of signing generates a PAdES document with LTV.
3. A method for digital signing of documents (210) comprising steps:
reception (21 1 ) of a document (210),
signing by at least one user (200, 1200, 2200), comprising
preparation for signing (31 1 ) and storing or temporarily storing as a prepared document (312),
transmission (313) of the prepared document as request for signing to PKI,
reception (412) of signature from PKI,
generation of a digital signature (320),
extraction (321 ) of signature from received signature from PKI and transmission to a unit for porting (330) of the signature,
transmission (315) of the prepared document for completion of signature to the unit for porting (330) of the signature to the document,
time stamping (331 ), lookup to create OCSP (332),
completion of signing (333), and
transmission (2340) to a subsequent user (2200) for signing, returning (1344, 2344) of signed document (230, 12230),
characterised in that the users (200, 1200, 2200) signs with own private key.
4. The method according to claim 3, wherein the completion of signing generates a PAdES document with LTV.
PCT/NO2013/050198 2012-11-15 2013-11-15 Signature porting WO2014077698A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20121349 2012-11-15
NO20121349A NO335397B1 (en) 2012-11-15 2012-11-15 signature Porting

Publications (1)

Publication Number Publication Date
WO2014077698A1 true WO2014077698A1 (en) 2014-05-22

Family

ID=50731503

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NO2013/050198 WO2014077698A1 (en) 2012-11-15 2013-11-15 Signature porting

Country Status (2)

Country Link
NO (1) NO335397B1 (en)
WO (1) WO2014077698A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2905925A1 (en) * 2014-02-10 2015-08-12 Ims Health Incorporated System and method for remote access, remote digital signature
FR3048530A1 (en) * 2016-03-01 2017-09-08 Lex Persona OPEN AND SECURE SYSTEM OF ELECTRONIC SIGNATURE AND ASSOCIATED METHOD

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US20040181756A1 (en) * 2000-06-06 2004-09-16 Berringer Ryan R. Creating and verifying electronic documents
US20070208944A1 (en) * 2006-03-02 2007-09-06 Microsoft Corporation Generation of electronic signatures
WO2008004221A2 (en) * 2006-07-05 2008-01-10 Wondernet Ltd Inserting digital signatures into a transformed document
JP2009004853A (en) * 2007-06-19 2009-01-08 Nippon Telegr & Teleph Corp <Ntt> Signature format converting device, preprocessor, signature verifying device, signature format converting method, program and storage medium thereof
US20090024912A1 (en) 2007-07-18 2009-01-22 Docusign, Inc. Systems and methods for distributed electronic signature documents
WO2012114602A1 (en) 2011-02-23 2012-08-30 セイコーインスツル株式会社 Long-term-signature terminal, long-term-signature server, long-term-signature terminal program, and long-term-signature server program

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US20040181756A1 (en) * 2000-06-06 2004-09-16 Berringer Ryan R. Creating and verifying electronic documents
US20070208944A1 (en) * 2006-03-02 2007-09-06 Microsoft Corporation Generation of electronic signatures
WO2008004221A2 (en) * 2006-07-05 2008-01-10 Wondernet Ltd Inserting digital signatures into a transformed document
JP2009004853A (en) * 2007-06-19 2009-01-08 Nippon Telegr & Teleph Corp <Ntt> Signature format converting device, preprocessor, signature verifying device, signature format converting method, program and storage medium thereof
US20090024912A1 (en) 2007-07-18 2009-01-22 Docusign, Inc. Systems and methods for distributed electronic signature documents
WO2012114602A1 (en) 2011-02-23 2012-08-30 セイコーインスツル株式会社 Long-term-signature terminal, long-term-signature server, long-term-signature terminal program, and long-term-signature server program
US20130326225A1 (en) 2011-02-23 2013-12-05 Il Sung Co., Ltd. Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AZIZI FAZEL AHMAD: "Advanced Electronic Signature", NORWEGIAN UNIVERISTY OF SCIENCE AND TECHNOLOGY DEPARTMENT OF TELEMATICS, June 2012 (2012-06-01) *
AZIZI, FAZEL AHMAD, ADVANCED ELECTRONIC SIGNATURE, June 2011 (2011-06-01)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2905925A1 (en) * 2014-02-10 2015-08-12 Ims Health Incorporated System and method for remote access, remote digital signature
US9722794B2 (en) 2014-02-10 2017-08-01 Ims Health Incorporated System and method for remote access, remote digital signature
FR3048530A1 (en) * 2016-03-01 2017-09-08 Lex Persona OPEN AND SECURE SYSTEM OF ELECTRONIC SIGNATURE AND ASSOCIATED METHOD
WO2017149453A1 (en) * 2016-03-01 2017-09-08 Lex Persona Open, secure electronic signature system and associated method

Also Published As

Publication number Publication date
NO20121349A1 (en) 2014-05-16
NO335397B1 (en) 2014-12-08

Similar Documents

Publication Publication Date Title
US10511440B2 (en) Methods of proving validity and determining validity, electronic device, server and computer programs
CN112291245B (en) Identity authorization method, identity authorization device, storage medium and equipment
US8954731B2 (en) Distributive computation of a digital signature
US20070118732A1 (en) Method and system for digitally signing electronic documents
JP5700422B2 (en) Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program
US20050132201A1 (en) Server-based digital signature
CN107832632B (en) Asset certification authorization query method, system, electronic device and computer readable storage medium
JP2002032344A (en) Method and device for providing contents
EP1307863A1 (en) Digital receipt for a transaction
WO2009028794A2 (en) Method for providing anonymous public key infrastructure and method for providing service using the same
WO2012166299A1 (en) Method and system for registering a drm client
MX2012011105A (en) Certificate authority.
JP2006157399A (en) Method for supporting exchange of electronic document with electronic signature, and information processing apparatus
CN112311538A (en) Identity authentication method, device, storage medium and equipment
CN115345617A (en) Method and device for generating non-homogeneous general evidence
WO2012114603A1 (en) Long-term-signature terminal, long-term-signature server, long-term-signature terminal program, and long-term-signature server program
CN116032613A (en) Block chain digital certificate exchange method, file storage access method and system
CN110417724B (en) Method, system, server and terminal for combined authentication of login states of application programs
CN114079645B (en) Method and device for registering service
WO2014077698A1 (en) Signature porting
KR20120112290A (en) System for creating and certifying the original of digital contents and method thereof
CN111082941B (en) Internet of things data sharing method and system based on block chain technology
JP2010081072A (en) Apparatus and method for time certification, and program
JP2014039193A (en) Information processor, management device, information processing method and program
KR101355080B1 (en) System for syndicating the original of digital contents for contents provider and method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13854367

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13854367

Country of ref document: EP

Kind code of ref document: A1