[go: up one dir, main page]

Jøsang et al., 2008 - Google Patents

Robust WYSIWYS: a method for ensuring that what you see is what you sign

Jøsang et al., 2008

View PDF
Document ID
14839302152198056871
Author
Jøsang A
AlFayyadh B
Publication year

External Links

Snippet

The security of digital signatures depends not only on the cryptographic strength of the digital signature algorithms used, but also on the integrity of the platform on which the digital signature application is running. Breach of platform integrity due to unintentional or …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2288Version control
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/042Payment circuits characterized in that the payment protocol involves at least one cheque
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation

Similar Documents

Publication Publication Date Title
US7774608B2 (en) Author signatures for legal purposes
CN101167297B (en) Method and apparatus for adding signature information to electronic documents
JP6296060B2 (en) How to use an analog digital (AD) signature with additional confirmation to sign a document
US8719578B2 (en) Document verifying apparatus, document verifying method, and computer product
US20010034835A1 (en) Applied digital and physical signatures over telecommunications media
US20100031140A1 (en) Verifying An Electronic Document
US20030145197A1 (en) Apparatus and method for detecting illegitimate change of web resources
JP2007533182A (en) Method and system for linking a certificate to a signed file
CN111683098B (en) Anti-crawler method and device, electronic equipment and storage medium
Jøsang et al. What you see is not always what you sign
US8484555B2 (en) Electronic document control apparatus, method, program and system
JP4103340B2 (en) Digital signature display device
US8751812B2 (en) Electronic signature authentication
US20140195811A1 (en) Method And An Apparatus For Securely Signing Application Data
JP5108285B2 (en) Signature method, information processing apparatus, and signature program
Gebhardt et al. A Note on the Practical Value of Single Hash Collisions for Special File Formats.
US8418058B2 (en) Graphical indication of signed content
TWM520159U (en) Device for generating and identifying electronic document containing electronic authentication and paper authentication
Jøsang et al. Robust WYSIWYS: a method for ensuring that what you see is what you sign
JP2003281333A (en) System, method and program for electronic signature, and recording medium having the program recorded thereon
US20010049789A1 (en) Method for the secure display during transmission of data or data files between users
Alsaid et al. Dynamic content attacks on digital signatures
Scheibelhofer Signing XML documents and the concept of" What you see is what you sign"
CN113111283B (en) Forensic server, forensic server method, storage medium, and program product
Alzomai et al. Display security for online transactions: SMS-based authentication scheme