ETSI TR 119 100-2016 Electronic Signatures and Infrastructures (ESI) Guidance on the use of standards for signature creation and validation (V1 1 1)《电子签名和基础设施(ESI) 使用签名创建标准和验证标准的指南_1.pdf

上传人:lawfemale396 文档编号:736535 上传时间:2019-01-12 格式:PDF 页数:89 大小:3.16MB
下载 相关 举报
ETSI TR 119 100-2016 Electronic Signatures and Infrastructures (ESI) Guidance on the use of standards for signature creation and validation (V1 1 1)《电子签名和基础设施(ESI) 使用签名创建标准和验证标准的指南_1.pdf_第1页
第1页 / 共89页
ETSI TR 119 100-2016 Electronic Signatures and Infrastructures (ESI) Guidance on the use of standards for signature creation and validation (V1 1 1)《电子签名和基础设施(ESI) 使用签名创建标准和验证标准的指南_1.pdf_第2页
第2页 / 共89页
ETSI TR 119 100-2016 Electronic Signatures and Infrastructures (ESI) Guidance on the use of standards for signature creation and validation (V1 1 1)《电子签名和基础设施(ESI) 使用签名创建标准和验证标准的指南_1.pdf_第3页
第3页 / 共89页
ETSI TR 119 100-2016 Electronic Signatures and Infrastructures (ESI) Guidance on the use of standards for signature creation and validation (V1 1 1)《电子签名和基础设施(ESI) 使用签名创建标准和验证标准的指南_1.pdf_第4页
第4页 / 共89页
ETSI TR 119 100-2016 Electronic Signatures and Infrastructures (ESI) Guidance on the use of standards for signature creation and validation (V1 1 1)《电子签名和基础设施(ESI) 使用签名创建标准和验证标准的指南_1.pdf_第5页
第5页 / 共89页
点击查看更多>>
资源描述

1、 ETSI TR 119 100 V1.1.1 (2016-03) Electronic Signatures and Infrastructures (ESI); Guidance on the use of standards for signature creation and validation TECHNICAL REPORT ETSI ETSI TR 119 100 V1.1.1 (2016-03) 2 Reference DTR/ESI-0019100 Keywords e-commerce, electronic signature, security, trust serv

2、ices ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded fro

3、m: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perc

4、eived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revi

5、sion or change of status. Information on the current status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/Commi

6、teeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written a

7、uthorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and

8、 LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 119 100 V1.1.1 (2016-03) 3 Contents Intellectual Property Rights 6g3Foreword . 6g3Modal verbs

9、 terminology 6g3Introduction 6g31 Scope 7g32 References 7g32.1 Normative references . 7g32.2 Informative references 7g33 Definitions and abbreviations . 10g33.1 Definitions 10g33.2 Abbreviations . 12g34 Introduction to the guided implementation process . 13g34.1 How to use the present document . 13g

10、34.2 An overview of the guided implementation process 13g35 Analysing the Business Requirements . 16g36 Managing the policy and security requirements . 17g37 Business scoping parameters 17g37.1 Introduction 17g37.2 Business scoping parameters mainly related with the business process . 18g37.2.1 Intr

11、oduction. 18g37.2.2 BSP (a): Workflow (sequencing and timing) of digital signatures . 18g37.2.2.1 Introduction . 18g37.2.2.2 Multiple signatures 18g37.2.2.3 Timing and sequencing . 19g37.2.3 BSP (b): Data Object(s) to be signed 20g37.2.4 BSP (c): Relationships of signatures with signed data object(s

12、) and signature(s) 20g37.2.5 BSP (d): Targeted community 21g37.2.6 BSP (e): Allocation of responsibility of signatures validation and augmentation 21g37.3 Business scoping parameters mainly influenced by legal/regulatory framework where the business process is conducted . 21g37.3.1 Introduction. 21g

13、37.3.2 BSP (f): Legal Effect of the signatures . 21g37.3.3 BSP (g): Commitment assumed by signer 22g37.3.4 BSP (h): Level of assurance of timing evidences . 23g37.3.5 BSP (i): Formalities of signing . 23g37.3.6 BSP (j): Longevity and resilience to change . 24g37.3.7 BSP (k): Archival . 24g37.4 Busin

14、ess scoping parameters mainly related to the actors involved in generating the signature 24g37.4.1 BSP (l): Identity (and roles/attributes) of the signer . 24g37.4.2 BSP (m): Level of assurance required for the authentication of the signer. 25g37.4.3 BSP (n): Signature creation devices 25g37.5 Other

15、 Business scoping parameters 25g37.5.1 Introduction. 25g37.5.2 BSP (o): Other information to be included within the signatures . 25g37.5.3 BSP (p): Cryptographic suites 26g37.5.4 BSP (q): Technological environment 26g38 Selecting the most appropriate standards, options, and technical mechanisms 26g3

16、8.1 Introduction 26g38.2 Format of signatures: CAdES, XAdES or PAdES . 27g38.2.1 Introduction. 27g38.2.2 Format of the document 27g38.2.3 Relative placement of signatures and signed data objects 28g3ETSI ETSI TR 119 100 V1.1.1 (2016-03) 4 8.2.3.1 Introduction . 28g38.2.3.2 Enveloped signatures 28g38

17、.2.3.3 Enveloping signatures . 28g38.2.3.4 Detached signatures 29g38.2.3.5 Simultaneous multiple relative positions 29g38.2.4 Number of signatures and signed data objects 29g38.2.4.1 Introduction . 29g38.2.4.2 One document is signed by only one signature . 29g38.2.4.3 One document is signed by more

18、than one signature 29g38.2.4.4 One signature is required to sign more than one data object . 30g38.3 A container for packaging together signatures and detached signed data objects 30g38.4 Baseline or extended/additional? 31g38.5 Selecting the proper quality of the signature 31g38.6 Mapping formaliti

19、es of signing to the electronic domain . 32g38.7 Satisfying timing and sequencing requirements . 32g38.7.1 Satisfying sequencing requirements . 32g38.7.1.1 Introduction . 32g38.7.1.2 Including counter-signatures . 32g38.7.2 Satisfying timing requirements . 33g38.7.2.1 Introduction . 33g38.7.2.2 Time

20、-stamping the data objects to be signed before signature generation 33g38.7.2.3 Including claimed signing time . 33g38.7.2.4 Including time-stamp token on the digital signature value 34g38.8 Including indication of commitments assumed by the signer . 35g38.9 Including and protecting indication of si

21、gners identity, signers roles and/or attributes 36g38.9.1 Including and protecting indication of signers identity 36g38.9.2 Including signers roles and/or attributes 37g38.10 Including additional signed information. 38g38.10.1 Introduction. 38g38.10.2 Including explicit indication of the signature p

22、olicy . 38g38.10.3 Including indication of the signed data object format . 39g38.10.4 Including indication of the signature production place . 40g38.11 Supporting signatures lifecycle 40g38.11.1 Introduction. 40g38.11.2 Including time-stamp tokens on the digital signature value 40g38.11.3 Including

23、references to validation data . 41g38.11.3.1 Rationale . 41g38.11.3.2 Including references to certificates . 42g38.11.3.3 Including references to certificate status data . 42g38.11.4 Time-stamping references to validation data 43g38.11.5 Enlarging longevity and resilience to change . 44g38.11.5.1 In

24、troduction . 44g38.11.5.2 Incorporating containers for validation material . 46g38.11.5.3 Incorporating time-stamp tokens for long term availability and integrity of the validation material . 47g38.11.6 Digital signatures lifecycle . 49g38.11.6.1 Generation, validation and augmentation of digital si

25、gnatures. 49g38.11.6.2 Lifecycle and levels of digital signatures 55g38.11.6.3 Transitions between levels of baseline signatures and containers . 60g38.11.6.4 Transitions between levels of extended signatures . 61g38.11.7 ASiC containers lifecycle . 65g38.12 Selecting proper Signature Creation Devic

26、es . 73g38.13 Selecting proper cryptographic suites. 74g38.14 Signature generation, augmentation and validation applications . 74g38.14.1 Introduction. 74g38.14.2 Selecting the suitable Protection Profile . 74g38.14.3 Implementing the signature generation and augmentation processes . 74g38.14.4 Impl

27、ementing the signature validation process . 75g39 Signature creation and validation catalysing toolkit 77g39.1 Introduction 77g39.2 Technical Specifications . 77g3ETSI ETSI TR 119 100 V1.1.1 (2016-03) 5 9.3 Conformance testing software tools . 78g39.4 Interoperability test events . 78g310 Evaluation

28、 processes 79g311 Corollary: the process within the context of the Standardization Framework . 80g3Annex A: Securing signed detached objects in XAdES signatures in the long term . 81g3A.1 Introduction 81g3A.2 Securing detached objects signed with ds:SignedInfo . 81g3A.3 Detached objects signed with

29、signed ds:Manifest 81g3A.3.1 The initial situation . 81g3A.3.2 The problem: detached data objects signed through ds:Manifest and their resilience to digest algorithm break . 83g3A.3.3 The solution: xadesv141:RenewedDigests element . 85g3Annex B: Bibliography 88g3History 89g3ETSI ETSI TR 119 100 V1.1

30、.1 (2016-03) 6 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intell

31、ectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, includ

32、ing IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been p

33、roduced by ETSI Technical Committee Electronic Signatures and Infrastructures (ESI). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Dr

34、afting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Introduction ETSI TR 119 000 i.1: “The framework for standardization of signatures: overview“, describes the structure of a general framework

35、for digital signatures standardization (hereinafter denoted as Rationalized Framework or Framework) outlining existing and potential standards related to the implementation of digital signatures and the provision of related trust services by trust service providers. This framework identifies six are

36、as of standardization with a list of existing and potential future standards in each area. ETSI TR 119 000 i.1 includes a set of guidance documents to assist business stakeholders, users and their suppliers in mapping or deriving from their business driven requirements the appropriate selection of d

37、igital signature standards and their options. Each guide addresses a particular area as identified in the aforementioned Rationalized Framework. A complete solution will need to address requirements in most of these areas. This series is based on the selection of the business scoping parameters for

38、each area of standardization. The selection of these scoping parameters is based on a process involving an analysis of the business requirements and associated risks leading to an identification of the policy and security requirements and to an analysis of the resulting business scoping parameters f

39、rom which the appropriate standards and options can be selected. From the requirements expressed in terms of business scoping parameters for an area, each guidance document provides assistance in selecting the appropriate standards and their options for that area. Where standards and their options w

40、ithin one area make use of another area this is stated in terms of scoping parameters of that other area. This general process of the selection of standards and options is described further in ETSI TR 119 000 i.1, clause 4.2.6. ETSI ETSI TR 119 100 V1.1.1 (2016-03) 7 1 Scope The present document, wh

41、ich addresses area 1 of the Framework i.1, provides a business driven guided process for implementing generation and validation of digital signatures in business electronic processes. Starting from a business analysis and risk analysis of the business electronic processes, stakeholders are guided fo

42、r making the best choice among the wide offer of standards in order to ensure the best implementation of digital signatures within the addressed application/business electronic processes. The target audience includes enterprise/business process architects, application architects, application develop

43、ers, and signature policy issuers. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest versio

44、n of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https:/docbox.etsi.org/Reference/. NOTE: While any hyperlinks included in this clause were valid at the time of publication, E

45、TSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. Not applicable. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or non-sp

46、ecific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long t

47、erm validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 ETSI TR 119 000: “Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures: ov

48、erview“. i.2 ETSI EN 319 122-1: “Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures“. i.3 ETSI EN 319 122-2: “Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 2: Extended CAdES signatures“. i

49、.4 ETSI EN 319 132-1: “Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures“. i.5 ETSI EN 319 132-2: “Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 2: Extended XAdES signatures“. i.6 ETSI EN 319 142-1: “Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures“. i.7 ETSI EN 319 142-2: “Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 2: Add

展开阅读全文
相关资源
猜你喜欢
  • ASTM C999-2017 Standard Practice for Soil Sample Preparation for the Determination of Radionuclides《制备土壤样品测定放射性核素的标准实施规程》.pdf ASTM C999-2017 Standard Practice for Soil Sample Preparation for the Determination of Radionuclides《制备土壤样品测定放射性核素的标准实施规程》.pdf
  • ASTM D1000-2004 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications《电气和电子设备用压敏粘结涂覆带的标准试验方法》.pdf ASTM D1000-2004 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications《电气和电子设备用压敏粘结涂覆带的标准试验方法》.pdf
  • ASTM D1000-2004e1 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications.pdf ASTM D1000-2004e1 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications.pdf
  • ASTM D1000-2009 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications.pdf ASTM D1000-2009 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications.pdf
  • ASTM D1000-2010 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications《电气和电子设备用压敏粘合剂涂层胶带的标准试验方法》.pdf ASTM D1000-2010 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications《电气和电子设备用压敏粘合剂涂层胶带的标准试验方法》.pdf
  • ASTM D1000-2017 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications《电气和电子应用使用压敏胶带的标准试验方法》.pdf ASTM D1000-2017 Standard Test Methods for Pressure-Sensitive Adhesive-Coated Tapes Used for Electrical and Electronic Applications《电气和电子应用使用压敏胶带的标准试验方法》.pdf
  • ASTM D1002-2005 Standard Test Method for Apparent Shear Strength of Single-Lap-Joint Adhesively Bonded Metal Specimens by Tension Loading (Metal-to-Metal)《用拉力负载法测定单面搭接粘结的金属试样表面剪切强度.pdf ASTM D1002-2005 Standard Test Method for Apparent Shear Strength of Single-Lap-Joint Adhesively Bonded Metal Specimens by Tension Loading (Metal-to-Metal)《用拉力负载法测定单面搭接粘结的金属试样表面剪切强度.pdf
  • ASTM D1002-2010 Standard Test Method for Apparent Shear Strength of Single-Lap-Joint Adhesively Bonded Metal Specimens by Tension Loading (Metal-to-Metal)《用拉力负载测定金属之间胶粘剂抗剪切强度特性的标准试.pdf ASTM D1002-2010 Standard Test Method for Apparent Shear Strength of Single-Lap-Joint Adhesively Bonded Metal Specimens by Tension Loading (Metal-to-Metal)《用拉力负载测定金属之间胶粘剂抗剪切强度特性的标准试.pdf
  • ASTM D1003-2000 Standard Test Method for Haze and Luminous Transmittance of Transparent Plastics《透明塑料混浊度和透光系数的标准试验方法》.pdf ASTM D1003-2000 Standard Test Method for Haze and Luminous Transmittance of Transparent Plastics《透明塑料混浊度和透光系数的标准试验方法》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1