• I.S. CWA 14170:2004

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    SECURITY REQUIREMENTS FOR SIGNATURE CREATION APPLICATIONS

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  07-06-2018

    Language(s):  English

    Published date:  23-07-2004

    Publisher:  National Standards Authority of Ireland

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1. Scope
    2. References
    3. Definitions
    4. Abbreviations
    5. Signature Creation Functional Model
        5.1 Signature Creation Objectives
        5.2 Model
        5.3 Signature Creation Applications
        5.4 Secure Signature Creation Devices
        5.5 Signature Creation Application Instantiation
        5.6 Control and possession of Signature Creation
             Systems
    6. Signed Data Object Information Model
        6.1 Signer's Document (SD)
        6.2 Signature Attributes
        6.3 Data To Be Signed (DTBS)
        6.4 Data To Be Signed (Formatted) (DTBSF)
        6.5 Data To Be Signed Representation (DTBSR)
        6.6 Advanced Electronic Signature
        6.7 Qualified Electronic Signature
        6.8 Signed Data Object
        6.9 Signer's Authentication Data (not shown)
    7. Overall Security Requirements of the SCA
        7.1 Introduction
        7.2 Trusted Path
             7.2.1 Basic Trusted Path Requirement
             7.2.2 Requirements for Public SCA
             7.2.3 Referencing the correct SD and Signature
                    Attributes
        7.3 Requirements for Distributed Signature Creation
             Applications
        7.4 Requirements resulting from un-trusted processes
             and communications ports
        7.5 Post signature verification of the Signed Data
             Object
        7.6 Requirements of the DTBS
    8. SD Presentation Component (SDP)
        8.1 Purpose
        8.2 Background
        8.3 Data Content Type Requirements
        8.4 SD Non-ambiguity Requirements
        8.5 Requirements for Presentation Insensitive SDs
        8.6 Hidden Text and Active Code Requirements
    9. Signature Attribute Viewer (SAV)
    10. Signer Interaction Component (SIC)
        10.1 High level user interface principles
        10.2 Signature Invocation
        10.3 Signature process inactivity timeout
        10.4 Signer Control Functions
        10.5 Retrieval of Signer's Characteristics
        10.6 User Interface Aspects
    11. Signer's Authentication Component (SAC)
        11.1 General Aspects
        11.2 Obtaining the Signer's Authentication Data
        11.3 Knowledge based Signer Authentication
        11.4 Biometric Signer Authentication
        11.5 Provision of the wrong Signer's Authentication
             Data
        11.6 Change of Signer's Authentication Data and Reset
             of the Retry Counter
        11.7 Signer's Authentication Data User Interface Aspects
        11.8 Security Requirements for the SAC Component
    12. Data To Be Signed Formatter (DTBSF)
        12.1 Functions of the DTBSF component
        12.2 Security Requirements for the DTBSF component
    13. Data Hashing Component (DHC)
        13.1 Functions of the DHC Component
        13.2 Production of the DTBS Representation
        13.3 Formatting of the electronic signature input
        13.4 Security Requirements for the DHC Component
    14. SCDev/SCA Communicator (SSC)
        14.1 Interaction Sequences
        14.2 Establishing the Physical Communication
        14.3 Retrieval of SCDev Token Information
        14.4 Selection of the SCDev functionality on a
              multi-application platform
        14.5 Retrieval of Certificates
        14.6 Selection of Signature Creation Data
        14.7 Performing Signer Authentication
        14.8 Digital Signature Computation
        14.9 Signature Logging
        14.10 Security requirements for the SSC Component
    15. SCD/SCA Authenticator (SSA)
        15.1 SCA - SCDev Authentication for SCA under service
             provider's control
        15.2 Security Requirements for the SSA Component
    16. SD Composer (SDC)
        16.1 Security Requirements for the SDC Component
    17. Signed Data Object Composer (SDOC)
    18. External Interface for Input/Output
        18.1 Risks to the SCA
        18.2 Import of Certificates
        18.3 Import of an SD and Signature Attributes
        18.4 Download of SCA Components
        18.5 Security Requirements for Input Control
    Annex A (Informative) - General Recommendations
        A.1 Operation of the Signature Creation Application
        A.2 Requirement on the environment
        A.3 Presentation insensitive SD
    Annex B Guidance to implement a User Interface
        B.1 Purpose
        B.2 User interface consistency
        B.3 Use of colour
        B.4 Feedback
        B.5 Security Breach detection
        B.6 Invalid choice
        B.7 Preservation of information presentation
        B.8 Personalisation
        B.9 Signer's Control when integrating with user
             profiling techniques
        B.10 Configure/Edit Signature Creation process
        B.11 Distinguishing between certificates
        B.12 Timing of operations
        B.13 Security of terminals in public domain
        B.14 User retention of secrets
        B.15 User instructions
        B.16 Presentation of operational sequence
        B.17 Presentation of distinguishable parts
        B.18 Guidance
        B.19 Terminology
        B.20 Error tolerance
        B.21 Informative error messages
        B.22 Single handed operation of public SCAs
        B.23 Cancellation of operation
        B.24 Undo operation
        B.25 Signer's Authentication Component (SAC)
             B.25.1 Choice of signer authentication method
             B.25.2 Biometric signer authentication
    Annex C Signature Logging Component (SLC)
    Annex D (Informative) - SCDev Holder Indicator (SHI)
    Annex E (Informative) - References

    Abstract - (Show below) - (Hide below)

    Outlines security requirements for Signature Creation Applications that create Advanced Electronic Signatures.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher National Standards Authority of Ireland
    Status Withdrawn

    Standards Referenced By This Book - (Show below) - (Hide below)

    EN 419221-5:2018 Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services
    I.S. EN 419221-5:2018 PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES

    Standards Referencing This Book - (Show below) - (Hide below)

    EN 1332-1:2009 Identification card systems - Human-machine interface - Part 1: Design principles for the user interface
    ETR 029 : 20001 HUMAN FACTORS (HF) - ACCESS TO TELECOMMUNICATIONS FOR PEOPLE WITH SPECIAL NEEDS - RECOMMENDATIONS FOR IMPROVING & ADAPTING TELECOMMUNICATION TERMINALS & SERVICES FOR PEOPLE WITH IMPAIRMENTS
    ES 201 381 : 1.1.1 HUMAN FACTORS (HF) - TELECOMMUNICATIONS KEYPADS AND KEYBOARDS - TACTILE IDENTIFIERS
    EN 1332-3:2008 Identification card systems - Man-machine interface - Part 3: Keypads
    ETR 334 : 20001 HUMAN FACTORS (HF) - THE IMPLICATIONS OF HUMAN AGEING FOR THE DESIGN OF TELEPHONE TERMINALS
    ETR 333 : 20002 HUMAN FACTORS (HF) - TEXT TELEPHONY - BASIC USER REQUIREMENTS AND RECOMMENDATIONS
    EN 1332-2 : 1998 IDENTIFICATION CARD SYSTEMS - MAN-MACHINE INTERFACE - DIMENSIONS AND LOCATION OF A TACTILE IDENTIFIER FOR ID-1 CARDS
    ETR 345 : 20001 HUMAN FACTORS (HF) - CHARACTERISTICS OF TELEPHONE KEYPADS AND KEYBOARDS - REQUIREMENTS OF ELDERLY AND DISABLED PEOPLE
    DIN V 66291-1:2000-04 CHIPCARDS WITH DIGITAL SIGNATUR APPLICATION/FUNCTION ACCORDING TO SIGG AND SIGV - PART 1: APPLICATION INTERFACE
    ETR 116 : 20001 HUMAN FACTORS GUIDELINES FOR ISDN TERMINAL EQUIPMENT DESIGN
    EN 1332-4:2007 Identification card systems - Man-machine interface - Part 4: Coding of user requirements for people with special needs
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective