Jøsang et al., 2008 - Google Patents
Robust WYSIWYS: a method for ensuring that what you see is what you signJøsang et al., 2008
View PDF- Document ID
- 14839302152198056871
- Author
- Jøsang A
- AlFayyadh B
- Publication year
External Links
Snippet
The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or …
- 230000001131 transforming 0 description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2288—Version control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/042—Payment circuits characterized in that the payment protocol involves at least one cheque
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7774608B2 (en) | Author signatures for legal purposes | |
CN101167297B (en) | Method and apparatus for adding signature information to electronic documents | |
JP6296060B2 (en) | How to use an analog digital (AD) signature with additional confirmation to sign a document | |
US8719578B2 (en) | Document verifying apparatus, document verifying method, and computer product | |
US20010034835A1 (en) | Applied digital and physical signatures over telecommunications media | |
US20100031140A1 (en) | Verifying An Electronic Document | |
US20030145197A1 (en) | Apparatus and method for detecting illegitimate change of web resources | |
JP2007533182A (en) | Method and system for linking a certificate to a signed file | |
CN111683098B (en) | Anti-crawler method and device, electronic equipment and storage medium | |
Jøsang et al. | What you see is not always what you sign | |
US8484555B2 (en) | Electronic document control apparatus, method, program and system | |
JP4103340B2 (en) | Digital signature display device | |
US8751812B2 (en) | Electronic signature authentication | |
US20140195811A1 (en) | Method And An Apparatus For Securely Signing Application Data | |
JP5108285B2 (en) | Signature method, information processing apparatus, and signature program | |
Gebhardt et al. | A Note on the Practical Value of Single Hash Collisions for Special File Formats. | |
US8418058B2 (en) | Graphical indication of signed content | |
TWM520159U (en) | Device for generating and identifying electronic document containing electronic authentication and paper authentication | |
Jøsang et al. | Robust WYSIWYS: a method for ensuring that what you see is what you sign | |
JP2003281333A (en) | System, method and program for electronic signature, and recording medium having the program recorded thereon | |
US20010049789A1 (en) | Method for the secure display during transmission of data or data files between users | |
Alsaid et al. | Dynamic content attacks on digital signatures | |
Scheibelhofer | Signing XML documents and the concept of" What you see is what you sign" | |
CN113111283B (en) | Forensic server, forensic server method, storage medium, and program product | |
Alzomai et al. | Display security for online transactions: SMS-based authentication scheme |