Surf ‘N’Sign: Client signatures on Web documents (original) (raw)
Related papers
Future of Online Signatures: The One-Sign Feature
International Journal of Research in Science and Technology
Have you ever messed up trying to sign a document digitally? If you did, then you know how difficult it is to use your index finger as a god-given stylus; To draw between those tiny exact spaces and redo it, again and again, in case the screen does not capture your finger drawn signature properly. Shouldn’t there be a better convenient, hassle-free way to do this? Something that ensures authenticity, accountability, security, and at the same time doesn’t feel like ‘draw-wrestling’? Here we present our solution in the form of a software system as a hypothesis going by the name ‘the One sign feature’. The feature is a crossplatform, profile-based, Sign Insertion method, which works when a password is successfully accepted, thereby inserting the sign on the document where selected. It is proposed as a solution to the "Small Screen, Too Much Work, Less Authenticity and Less Accountability" problem statement, which are common limitations of all the current solution offerings. T...
Morph Digital Signature A New Signature Framework for e-Documents in Pervasive Environments
Pervasive Services, IEEE …, 2007
Nowadays the exchange of documents, information and data is fulfilled through an electronic format. This arises security problems (i.e. Authentication, non repudiation and privacy). In order to tackle some security issues, the digital signature allows to strongly identify the signatory and prevents against any signed content violation.
A Practical Approach to expressing digitally signed documents
ArXiv, 2019
Initially developed and considered for providing authentication and integrity functions, digital signatures are studied nowadays in relation to electronic documents (edocs) so that they can be considered equivalent to handwritten signatures applied on paper documents. Nevertheless, a standardized format to be used specifically for e-doc representation was not yet specified. Each document management system is free to choose whatever e-doc format is suitable for its requirements (e.g. ASCII, Word, PDF, binary). So far, some solutions for document management systems were found but none of them was designed to consider security an important requirement and to enable digital signing and easy management of e-docs. A possible solution to this problem is our secure document management system named AIDA. This paper focuses on the use of XML and XML Signature for the representation of e-docs in AIDA.
Signatures to Go: A Framework for Qualified PDF Signing on Mobile Devices
2020
Electronic documents are an important part of a business workflow. To assure the integrity, authenticity, and non-repudiation of those documents, both public and private sectors use qualified electronic signatures to sign PDF files. Benefits of the resulting qualified PDF signing are widely recognized, and there are many desktop and web applications used to sign PDFs. Those applications usually require additional hardware, such as smartphones, or smart cards, to assure a multi-factor authentication in the signing process. However, the prevalence of mobile devices in everyday life posed a need for public services, which can be executed on a single mobile device. In this paper, we develop a user-friendly and privacy-preserving framework for qualified PDF signing on mobile devices. We show the feasibility of our framework by implementing all necessary components: the PDF processing application, the Trust Service Provider server-side, and clientside application. The main focus of these ...
2012
Nowadays, recognizing whether or not a digital document has been counterfeit is a priority issue, particularly in organizations where legal information is handled digitally. Signing a digital document is maybe a preliminary solution. In general, we are interested in developing a web service that allows signing a document using cryptography and steganography techniques to protect the information; and also, it can verify the authenticity of the document that has previously been signed. To protect the web service against malicious activity there are aspects of computer security that must be considered, such as the implementation of a security protocol considered secure. This article reports the general ingredients to implement a Web Service to sign and authenticate digital documents using a symmetric cryptography protocol previously published by the authors; and also it describes some implementations carried out so far.
Applications of Digital Signature Certificates for Online Information Security
Improving Information Security Practices through Computational Intelligence
Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats. Digital signature certificates, currently offers one of the most trusted solutions to achieve CIA-trio for online information. This chapter discusses online information security through cryptography. It explains digital signature certificates; their benefits, the underlying standards, involved techniques, procedures, algorithms, processes, structure, management, formats, and illustration of their working. It highlights the potential of digital signatures and certificates in information security across different devices, services, and applications. It introduces a few useful tools to learn, train, and implement digital signature certificates.
Information technology is becoming the world's most influential factors in everyday life. It has even large economic impact in family and state budget. Web software systems, due to their friendly network configuration and hardware independence properties ate gaining more and more user acceptance. But, in web systems the authenticity of transmitted and stored data is still an open challenge. This paper aims to give the answer to these questions using digital certificates, as defined by ISO X.509 standard, for encrypting communication channel and digitally signing student data for archiving. The implementation of digital signatures on the web has special challenges. Digital signature uses digital certificate of the current user, which certificate is stored in user’s local store or file and it has restricted access. This paper presents an implementation web digital signature in two different platforms: (i) using Microsoft browser, and (ii) non-Microsoft browser and comparing their ...
Multimedia document authentication using on-line signatures as watermarks
Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is especially true in the case of documents that are exchanged over the Internet, which could be accessed and modified by intruders. The most popular methods used for authentication of digital documents are public key encryption-based authentication and digital watermarking. Traditional watermarking techniques embed a predetermined character string, such as the company logo, in a document. We propose a fragile watermarking system, which uses an on-line signature of the author as the watermark in a document. The embedding of a biometric characteristic such as signature in a document enables us to verify the identity of the author using a set of reference signatures, in addition to ascertaining the document integrity. The receiver of the document reconstructs the signature used to watermark the document, which is then used to verify the author's claimed identity. The paper presents a signature encoding scheme, which facilitates reconstruction by the receiver, while reducing the chances of collusion attacks.
A Practical Approach for Implementation of Public Key Infrastructure for Digital Signatures
In an organization with its own Private Network , it is not just enough to transfer the documents from one person to another, but also it needs to ensure that the document retains its integrity, confirms the authenticity of the sender, provides privacy, if required and it is safe against repudiations. To address these, it is proposed to establish a public key infrastructure (PKI) for digital signatures with in the organizations. Public key infrastructure provides robust and rigorous security measures to protect user data and credentials. In this paper, it is proposed that documents are digitally signed on before being sent as an authentication measure. The trust between two parties and digital signatures are reinforced by components of public key infrastructure (PKI) namely Public Key Cryptography, Certificate Authority (CA), Certificates, Certificate Repository (CR), and also a simple application to demonstrate the same would also be attempted.