Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

I.S. CWA 14170:2004

Withdrawn
Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

SECURITY REQUIREMENTS FOR SIGNATURE CREATION APPLICATIONS
Available format(s)

Hardcopy , PDF

Withdrawn date

07-06-2018

Language(s)

English

Published date

23-07-2004

Preview

Foreword
Introduction
1. Scope
2. References
3. Definitions
4. Abbreviations
5. Signature Creation Functional Model
    5.1 Signature Creation Objectives
    5.2 Model
    5.3 Signature Creation Applications
    5.4 Secure Signature Creation Devices
    5.5 Signature Creation Application Instantiation
    5.6 Control and possession of Signature Creation
         Systems
6. Signed Data Object Information Model
    6.1 Signer's Document (SD)
    6.2 Signature Attributes
    6.3 Data To Be Signed (DTBS)
    6.4 Data To Be Signed (Formatted) (DTBSF)
    6.5 Data To Be Signed Representation (DTBSR)
    6.6 Advanced Electronic Signature
    6.7 Qualified Electronic Signature
    6.8 Signed Data Object
    6.9 Signer's Authentication Data (not shown)
7. Overall Security Requirements of the SCA
    7.1 Introduction
    7.2 Trusted Path
         7.2.1 Basic Trusted Path Requirement
         7.2.2 Requirements for Public SCA
         7.2.3 Referencing the correct SD and Signature
                Attributes
    7.3 Requirements for Distributed Signature Creation
         Applications
    7.4 Requirements resulting from un-trusted processes
         and communications ports
    7.5 Post signature verification of the Signed Data
         Object
    7.6 Requirements of the DTBS
8. SD Presentation Component (SDP)
    8.1 Purpose
    8.2 Background
    8.3 Data Content Type Requirements
    8.4 SD Non-ambiguity Requirements
    8.5 Requirements for Presentation Insensitive SDs
    8.6 Hidden Text and Active Code Requirements
9. Signature Attribute Viewer (SAV)
10. Signer Interaction Component (SIC)
    10.1 High level user interface principles
    10.2 Signature Invocation
    10.3 Signature process inactivity timeout
    10.4 Signer Control Functions
    10.5 Retrieval of Signer's Characteristics
    10.6 User Interface Aspects
11. Signer's Authentication Component (SAC)
    11.1 General Aspects
    11.2 Obtaining the Signer's Authentication Data
    11.3 Knowledge based Signer Authentication
    11.4 Biometric Signer Authentication
    11.5 Provision of the wrong Signer's Authentication
         Data
    11.6 Change of Signer's Authentication Data and Reset
         of the Retry Counter
    11.7 Signer's Authentication Data User Interface Aspects
    11.8 Security Requirements for the SAC Component
12. Data To Be Signed Formatter (DTBSF)
    12.1 Functions of the DTBSF component
    12.2 Security Requirements for the DTBSF component
13. Data Hashing Component (DHC)
    13.1 Functions of the DHC Component
    13.2 Production of the DTBS Representation
    13.3 Formatting of the electronic signature input
    13.4 Security Requirements for the DHC Component
14. SCDev/SCA Communicator (SSC)
    14.1 Interaction Sequences
    14.2 Establishing the Physical Communication
    14.3 Retrieval of SCDev Token Information
    14.4 Selection of the SCDev functionality on a
          multi-application platform
    14.5 Retrieval of Certificates
    14.6 Selection of Signature Creation Data
    14.7 Performing Signer Authentication
    14.8 Digital Signature Computation
    14.9 Signature Logging
    14.10 Security requirements for the SSC Component
15. SCD/SCA Authenticator (SSA)
    15.1 SCA - SCDev Authentication for SCA under service
         provider's control
    15.2 Security Requirements for the SSA Component
16. SD Composer (SDC)
    16.1 Security Requirements for the SDC Component
17. Signed Data Object Composer (SDOC)
18. External Interface for Input/Output
    18.1 Risks to the SCA
    18.2 Import of Certificates
    18.3 Import of an SD and Signature Attributes
    18.4 Download of SCA Components
    18.5 Security Requirements for Input Control
Annex A (Informative) - General Recommendations
    A.1 Operation of the Signature Creation Application
    A.2 Requirement on the environment
    A.3 Presentation insensitive SD
Annex B Guidance to implement a User Interface
    B.1 Purpose
    B.2 User interface consistency
    B.3 Use of colour
    B.4 Feedback
    B.5 Security Breach detection
    B.6 Invalid choice
    B.7 Preservation of information presentation
    B.8 Personalisation
    B.9 Signer's Control when integrating with user
         profiling techniques
    B.10 Configure/Edit Signature Creation process
    B.11 Distinguishing between certificates
    B.12 Timing of operations
    B.13 Security of terminals in public domain
    B.14 User retention of secrets
    B.15 User instructions
    B.16 Presentation of operational sequence
    B.17 Presentation of distinguishable parts
    B.18 Guidance
    B.19 Terminology
    B.20 Error tolerance
    B.21 Informative error messages
    B.22 Single handed operation of public SCAs
    B.23 Cancellation of operation
    B.24 Undo operation
    B.25 Signer's Authentication Component (SAC)
         B.25.1 Choice of signer authentication method
         B.25.2 Biometric signer authentication
Annex C Signature Logging Component (SLC)
Annex D (Informative) - SCDev Holder Indicator (SHI)
Annex E (Informative) - References

Outlines security requirements for Signature Creation Applications that create Advanced Electronic Signatures.

DocumentType
Standard
Pages
65
PublisherName
National Standards Authority of Ireland
Status
Withdrawn

EN 419221-5:2018 Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services
I.S. EN 419221-5:2018 PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES

EN 1332-1:2009 Identification card systems - Human-machine interface - Part 1: Design principles for the user interface
ETR 029 : 20001 HUMAN FACTORS (HF) - ACCESS TO TELECOMMUNICATIONS FOR PEOPLE WITH SPECIAL NEEDS - RECOMMENDATIONS FOR IMPROVING & ADAPTING TELECOMMUNICATION TERMINALS & SERVICES FOR PEOPLE WITH IMPAIRMENTS
ES 201 381 : 1.1.1 HUMAN FACTORS (HF) - TELECOMMUNICATIONS KEYPADS AND KEYBOARDS - TACTILE IDENTIFIERS
EN 1332-3:2008 Identification card systems - Man-machine interface - Part 3: Keypads
ETR 334 : 20001 HUMAN FACTORS (HF) - THE IMPLICATIONS OF HUMAN AGEING FOR THE DESIGN OF TELEPHONE TERMINALS
ETR 333 : 20002 HUMAN FACTORS (HF) - TEXT TELEPHONY - BASIC USER REQUIREMENTS AND RECOMMENDATIONS
EN 1332-2 : 1998 IDENTIFICATION CARD SYSTEMS - MAN-MACHINE INTERFACE - DIMENSIONS AND LOCATION OF A TACTILE IDENTIFIER FOR ID-1 CARDS
ETR 345 : 20001 HUMAN FACTORS (HF) - CHARACTERISTICS OF TELEPHONE KEYPADS AND KEYBOARDS - REQUIREMENTS OF ELDERLY AND DISABLED PEOPLE
DIN V 66291-1:2000-04 CHIPCARDS WITH DIGITAL SIGNATUR APPLICATION/FUNCTION ACCORDING TO SIGG AND SIGV - PART 1: APPLICATION INTERFACE
ETR 116 : 20001 HUMAN FACTORS GUIDELINES FOR ISDN TERMINAL EQUIPMENT DESIGN
EN 1332-4:2007 Identification card systems - Man-machine interface - Part 4: Coding of user requirements for people with special needs

View more information
$186.63
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more