Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
This PWI covers two Protection Profiles, one for signature-creation applications and one for signature-verification applications:
PP-SCA
This PP defines the security requirements for a Signature Creation Application (SCA). The SCA runs on an Operating System of a Personal Computer (PC), or anotherelectronic machine.
The SCA is connected to an SSCD, which actually computes the electronic signature, as recommended by the European Directive for Electronic Signatures. The SCA applies a signature policy to generate attributes that are added to the signature to enable a future verification of the signature.
The main functions of the SCA are: importing the document to be signed, checking the document format, providing the ability to display this document to the signer, and upon the signer's decision, hash the document to generate the Data To Be Signed (DTBS) including attributes according to the selected signature policy, send the DTBS representation to the SSCD, and retrieve the signature from the SSCD.
Additionally, the SCA will check that the document format is compatible with its display ability. The signer shall be able to select a signature key with its corresponding certificate and a signature policy.
This PP shall be compatible with PP-SVA, i. e. a Security Target shall be able to claimconformance to both PP.
PP-SVA
This PP defines the security requirements for a Signature Verification Application(SVA). The SVA runs on an Operating System of Personal Computer (PC), or another electronic machine.
The SVA applies a signature policy to verify whether the signature is valid and if the signature corresponds to the signed document.
...
Reģistrācijas numurs (WIID)
32520
Darbības sfēra
This PWI covers two Protection Profiles, one for signature-creation applications and one for signature-verification applications:
PP-SCA
This PP defines the security requirements for a Signature Creation Application (SCA). The SCA runs on an Operating System of a Personal Computer (PC), or anotherelectronic machine.
The SCA is connected to an SSCD, which actually computes the electronic signature, as recommended by the European Directive for Electronic Signatures. The SCA applies a signature policy to generate attributes that are added to the signature to enable a future verification of the signature.
The main functions of the SCA are: importing the document to be signed, checking the document format, providing the ability to display this document to the signer, and upon the signer's decision, hash the document to generate the Data To Be Signed (DTBS) including attributes according to the selected signature policy, send the DTBS representation to the SSCD, and retrieve the signature from the SSCD.
Additionally, the SCA will check that the document format is compatible with its display ability. The signer shall be able to select a signature key with its corresponding certificate and a signature policy.
This PP shall be compatible with PP-SVA, i. e. a Security Target shall be able to claimconformance to both PP.
PP-SVA
This PP defines the security requirements for a Signature Verification Application(SVA). The SVA runs on an Operating System of Personal Computer (PC), or another electronic machine.
The SVA applies a signature policy to verify whether the signature is valid and if the signature corresponds to the signed document.
...