ImageVerifierCode 换一换
格式:PDF , 页数:18 ,大小:285.07KB ,
资源ID:453789      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-453789.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ASD-STAN PREN 9300-005-2012 Aerospace series LOTAR LOng Term Archiving and Retrieval of digital technical product documentation such as 3D CAD and PDM data Part 005 Authentication .pdf)为本站会员(progressking105)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ASD-STAN PREN 9300-005-2012 Aerospace series LOTAR LOng Term Archiving and Retrieval of digital technical product documentation such as 3D CAD and PDM data Part 005 Authentication .pdf

1、ASD-STAN STANDARD NORME ASD-STAN ASD-STAN NORM prEN 9300-005 Edition P 1 May 2012 PUBLISHED BY THE AEROSPACE AND DEFENCE INDUSTRIES ASSOCIATION OF EUROPE - STANDARDIZATIONAvenue de Tervuren, 270 - B-1150 Brussels - Tel. + 32 2 775 8126 - Fax. + 32 2 775 8131 - www.asd-stan.orgICS: Descriptors: ENGLI

2、SH VERSION Aerospace series LOTAR LOng Term Archiving and Retrieval of digital technical product documentation such as 3D, CAD and PDM data Part 005: Authentication and Verification Srie arospatiale LOTAR Archivage Long Terme et rcupration des donnes techniques produits numriques, telles que CAD 3D

3、et PDM Partie 005 : Authentification et Vrification Luft- und Raumfahrt LOTAR Langzeitarchivierung und Bereitstellung digitaler technischer Produktdokumentationen, beispielsweise 3D CAD und PDM Daten Teil 005: Authentifizierung und Verifikation This “Aerospace Series“ Prestandard has been drawn up u

4、nder the responsibility of ASD-STAN (The AeroSpace and Defence Industries Association of Europe - Standardization). It is published for the needs of the European Aerospace Industry. It has been technically approved by the experts of the concerned Domain following member comments. Subsequent to the p

5、ublication of this Prestandard, the technical content shall not be changed to an extent that interchangeability is affected, physically or functionally, without re-identification of the standard. After examination and review by users and formal agreement of ASD-STAN, it will be submitted as a draft

6、European Standard (prEN) to CEN (European Committee for Standardization) for formal vote and transformation to full European Standard (EN). The CEN national members have then to implement the EN at national level by giving the EN the status of a national standard and by withdrawing any national stan

7、dards conflicting with the EN. Edition approved for publication 01 May 2012 Comments should be sent within six months after the date of publication to ASD-STAN Engineering Procedures and Processes Domain Copyright 2012 by ASD-STAN prEN 9300-005:2012 (E) 2 Foreword This standard was prepared jointly

8、by AIA, ASD-STAN, PDES Inc and the PROSTEP iViP Association. The PROSTEP iViP Association is an international non-profit association in Europe. For establishing leadership in IT-based engineering it offers a moderated platform to its nearly 200 members from leading industries, system vendors and res

9、earch institutions. Its product and process data standardization activities at European and worldwide levels are well known and accepted. The PROSTEP iViP Association sees this standard and the related parts as a milestone of product data technology. PDES Inc is an international non-profit associati

10、on in USA. The mission of PDES Inc is to accelerate the development and implementation of ISO 10303, enabling enterprise integration and PLM interoperability for member companies. PDES Inc gathers members from leading manufacturers, national government agencies, PLM vendors and research organization

11、s. PDES Inc. supports this standard as an industry resource to sustain the interoperability of digital product information, ensuring and maintaining authentic longevity throughout their product lifecycle. Readers of this standard should note that all standards undergo periodic revisions and that any

12、 reference made herein to any other standard implies its latest edition, unless otherwise stated. The Standards will be published under two different standards organizations using different prefixes. ASD-Stan will publish the standard under the number EN 9300xxx. AIA will publish the standard under

13、the number NAS 9300xxx. The content in the EN 9300 and NAS 9300 documents will be the same. The differences will be noted in the reference documentation (i.e. for EN 9300 Geometric Dimensioning the identity of a user; Authentication of an electronic document establishes that the content is unchanged

14、 from to the original information. Information is original if it is demonstrable that the information belongs to the supposed author. Authentication may depend upon one or more authentication factors. Unlike verification and validation, authentication makes no statement about the quality of data in

15、terms of usability in the archiving process chain of e.g. conversion or reuse. 3.2 Asymmetric keys Asymmetric keys are pairs of keys, created in one step. They can be used in both directions. Encryption with the public key can only be decrypted with the private key. If the encryption is done with th

16、e private key, the decryption can only done with the public key. Such a key pair can be used for encryption and for signing. 3.2.1 Public key The public key is the part of the asymmetric key pair that is known to everyone. 3.2.2 Private key The private key is the part of the asymmetric key pair that

17、 is only known by the owner of the asymmetric key pair. prEN 9300-005:2012 (E) 6 3.3 Electronic document (Copied and modified from ISO-IEC 82045) The digital representation of a defined and structured amount of information which can be managed as a unit and be exchanged between users and systems. Ea

18、ch revision of a given document is a new electronic document. 3.4 Electronic signatures An electronic signature is a defined method to sign an object in electronic environments. It provides means to authenticate the signatory and the signed object in an unambiguous and safe way by attaching to or lo

19、gically associating data in electronic form to other electronic objects. In EN 9300 it is defined by an encrypted hash code with additional information such as time of creation and owner of the signature. ASD-STAN LOTAR distinguishes between: engineering signature; time signature. In the context of

20、the EN 9300, an electronic signature shall be: uniquely linked to the signatory; capable of identifying the signatory; created using means that the signatory can maintain under their sole control; linked to the data to which it relates in such a manner that any subsequent change of the data is detec

21、table. NOTE This definition complies with that given by: Directive in 1999/93/EC of the European parliament and the council from the 13th of December, 1999 concerning collective basic conditions of electronic signatures. 3.4.1 Engineering Signature The engineering signature expresses and fixes a vol

22、ition of the signatory it gives evidence of: the process of testifying quality of data against process/quality requirements by linking the signature owner to the data; the identity of the signatory by usage of appropriate methods of authentication; the integrity of the data by using appropriate meth

23、ods protecting the signed object against unauthorized changes. 3.4.2 Time Signature A time signature is created automatically as part of a certified process and requires certified hardware. It provides a legal guarantee for time and owner of the data. prEN 9300-005:2012 (E) 7 3.5 Hash Code A Hash Co

24、de is represented by a number calculated by a One-Way-Hash function. It represents the electronic document in a unique way. 3.6 Signer A signer is an entity that initially creates the electronic signature. When the signer digitally signs data using the prescribed format, this represents a commitment

25、 on behalf of the signing entity about the data being signed. 3.7 Verifier A verifier is an entity that verifies evidence. (ISO/IEC 13888-1). Within the context of this document this is an entity that validates an electronic signature. 3.8 Trust Center A Trust Center is one or more entities that hel

26、p to build trust relationships between the signer and verifier. Use of some specific technical service provider (TSP) services MAY be mandated by signature policy. TSP supporting services may provide the following information: user certificates, cross-certificates, time-stamping tokens. 3.9 Verifica

27、tion levels In the context of EN 9300 Verification Levels indicate a risk assessment. Verification Levels here will indicate the maximum acceptable risk for a specific process. 4 Applicability Refer to applicability of EN 9300-001, paragraph 4. 5 Authentication The necessity of authentication and ve

28、rification of digital information results from the legal requirement of ensuring the authenticity (originality and integrity) of stored data. 5.1 Authentication of User The authentication of the user is necessary to ensure only authorised persons initiate controlled processes. The legal status of an

29、 engineering signature will be enhanced by means of authentication. 5.1.1 Authentication by means of a PKI (Public Key Infrastructure) The application of a PKI is recommended to guarantee the quality of an engineering signature. Advantage: Delivers a higher evidential value. Disadvantages: The need

30、to provide an Infrastructure (PKI) with key ring administration; Each release of a document creates electronic signatures with metadata to manage. NOTE Currently there are different national laws and / or standards defining different security levels for PKI. By applying these levels different legal

31、qualities for documents can be obtained. prEN 9300-005:2012 (E) 8 5.1.2 Authentication by User Key and Password EN 9300 recommends authentication policies based on current business practices for user keys and passwords as the initial user authentication quality level. Advantages: Legal recommendatio

32、ns for documentation of the release process are fulfilled; There is no need for a PKI and no additional hardware for identification is required. Disadvantage: The validity in the context of lawsuits is less than under PKI. 5.2 Authentication of Document and Content Applying authentication to a docum

33、ent and its content will improve its evidential weight in the context of legal proceedings. The authenticity of a digital document can be proved with the document hash code. In case of a change of content, a new electronic document must be created and authenticated. 5.2.1 Requirements to Hash Codes

34、For signing and verification a hash code will be used like a digital finger print. To ensure that no security gaps occur, the hash code must fulfil the following criteria: It should practically be impossible to find a collision (where two or more different digital documents generate an identical has

35、h code); Creating hash codes shall be an one way function. It should not possible to find a file that generates a given hash code. NOTE From a theoretical point of view collisions are inevitable. 5.2.2 Usable Hash Functions It is recommended that the practice applied has the highest security level.

36、Its validity depends on the technical development in hardware, cryptography and networking. It is also recommended that hash codes have the maximum lifetime, in order to avoided renewing the hash code after a short period. NOTE 1 See, for example, the recommendations of the German Federal Network Ag

37、ency (for Electricity, Gas, Telecommunications, Post and Railway) in 2006: NOTE 2 Analysis of hash functions indicates that the following 160 bit functions may be considered as secure up to the end of 2009: RIPEMD-160; SHA-1. NOTE 3 The following hash functions with different hash code length (SHA-2

38、24 is a 224-bit hash function etc.) are expected to be secure for Long Term Archiving: SHA-224, SHA-256, SHA-384, SHA-512 2; FIPS PUB 180-3 “Secure Hash Standard (SHS)“. prEN 9300-005:2012 (E) 9 The actual permission has to be renewed in accordance to the highest applicable requirements in a defined

39、 and appropriate time frame. See figure below. Figure 1 Check and renew signature document 6 Qualification methods Qualification methods provide procedures to indicate the quality of processes, data and or information within the LOTAR framework. Two basic procedures are given: Verification; Validati

40、on; The result of verification and validation shall be kept in the system as status information. The result will distinguish between “passed“, “failed“ or “not performed“. “Not performed“ means that there is no result created in the verification or validation process. 6.1 Verification A verification

41、 of authenticity judges information against rules for legal admissibility, preferably those defined in standards or laws. Verification of the consistency of the information shall be applied throughout the throughout the Long Term Archiving (LTA) process. The initial verification takes place during t

42、he data preparation process. In case of data conversion, the verification is executed on the converted data. The EN 9300 introduces the verification of information on different levels. A verification of processes should guarantee that all parts of the process finished without errors. If required, th

43、e results of the process should be stored and archived into a process protocol (log file). prEN 9300-005:2012 (E) 10 The objectives of Verification in the LOTAR context are: Managing the risk of loss of information after a period of LTA; Re-interpretable information based on a stable data format; Av

44、oiding efforts of quality control and corrective methods (e.g. repair) in following processes of the archive chain. 6.1.1 Specification of Verification Levels In order to manage the risk of data or information loss during the LTA, LOTAR introduces a concept of verification levels. These levels are:

45、Verification Level Method Risk 0 No rules applied Maximum 1 Mandatory rules Calculated risk 2 Mandatory plus optional rules Minimized risk The rules and their categorization into “mandatory” and “optional” will be given within the Data Domain Specific Parts of LOTAR. 6.2 Validation Validation is app

46、lied to guarantee the integrity of the content of a document throughout the entire process of LTA. In the context of LOTAR the validation will be done by calculation and comparison of validation properties. 6.2.1 Validation Properties Validation properties are significant information, calculated wit

47、h the data inside the originator system; after each conversion within the LTA process. A set of Validation Properties is like a fingerprint for the content of the document. Each change of the content changes one or more attributes of the Validation Properties. Validation properties should be indepen

48、dent from the system and representation within given deviations. Validation properties are specific for each document type. They are stored as meta data and optionally in the LOTAR-Format file. For an automatic comparison of validation properties, a predefined matrix can be used. In this matrix valu

49、es for validation properties and accepted deviations from these can be stored to facilitate automated processing. The accepted deviations might differ in accordance to the defined use cases (e.g. product liability or design re-use) and has to be fixed. The detailed information on validation properties will be given in the Data Domain Specific Parts. prEN 9300-005:2012 (E) 11 6.2.2 Specification of Validation Levels In order to manage the integrity of content and the risk of data or information loss during the LTA LOTAR

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1