WO2002091669A1 - Device for digitally signing electronic documents - Google Patents

Device for digitally signing electronic documents Download PDF

Info

Publication number
WO2002091669A1
WO2002091669A1 PCT/SE2001/000958 SE0100958W WO02091669A1 WO 2002091669 A1 WO2002091669 A1 WO 2002091669A1 SE 0100958 W SE0100958 W SE 0100958W WO 02091669 A1 WO02091669 A1 WO 02091669A1
Authority
WO
WIPO (PCT)
Prior art keywords
signing
electronic documents
document
processor
signing electronic
Prior art date
Application number
PCT/SE2001/000958
Other languages
French (fr)
Inventor
Tom Rindborg
Joacim Halén
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to PCT/SE2001/000958 priority Critical patent/WO2002091669A1/en
Publication of WO2002091669A1 publication Critical patent/WO2002091669A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • the present invention relates to an arrangement for signing electronic documents digitally.
  • the present invention also relates to a use of an arrangement for signing electronic documents digitally.
  • the invention relates to measures for assuring that a displayed electronic document is the very document that is signed digitally.
  • An electronic document is here intended to mean any collection of bits, such as an electronic text document, an electronic business transaction, an electronic message of some type or a file.
  • the digital signature was invented in the 1970s. Digital signatures are produced using complicated mathematics, which guarantees that the signature is unforgeable and uncopyable.
  • a person A to sign the document has to have a private key that is secret to any other person.
  • the person A is to sign the electronic document he/she performs a mathematical calculation using the document and the private key. The result of the calculation, is the digital signature that is appended to the document.
  • the person A also has a public key that is publicly available.
  • the public key allows anyone to verify that the digital signature really was produced by the person A. This is done by means of performing a different calculation using the signed document and the public key. Since the person A alone knows his/her own private key the document must have been signed by him/her if the verification calculation checks out.
  • a handwritten signature on a document is generally used to indicate that the person who has signed the document agrees to the document or acknowledges that he/she has seen it.
  • the handwritten signature has an important legal status and can serve as evidence in court.
  • the tool used to produce the digital signature is generally a computer. It is the computer that performs the calculation necessary for signing and it is the computer that presents the electronic document to be signed and possibly transmits the signed document. If the computer can not be trusted, neither can the electronic document and the digital signature.
  • the international patent application WO 98/52151 aims at improving security when sensitive information is transmitted over a communications network, such as the Internet.
  • a communications network such as the Internet.
  • transaction messages that contain very sensitive information, such as credit card numbers, are transferred between computers or servers.
  • Methods and equipment that allow a user control over the creation of the transaction message are shown in the application.
  • the transaction message is created by means of using a smart card that is inserted in a reader of a computer, a mobile phone or a terminal in a shop.
  • the smart card contains a private key and the transaction message is created either in the smart card or in the computer and then signed using the private key stored in the smart card.
  • WO 98/52151 deals with the problem of giving the user control over the contents of a transaction message by means of letting the user himself create the message preferably off-line.
  • the European patent application EP 1054364 A2 and the German patent application DE 19811720 Al aims at solving this problem by means of securing that what is displayed is what is signed.
  • the European patent application EP 1054364 A2 solves the problem by means of creating a close relationship between a trusted display device and a chip card belonging to the person to sign a document.
  • the close relationship between the display device and the chip card is achieved since the chip card knows the public key of the display device and vice versa.
  • the display device and chip card co- operate in the signing procedure and communicate using encrypted messages that can be decrypted since the parts know each others public keys.
  • the German patent application DE 19811720 Al solves the problem by means of providing a secure module in which the private key is stored.
  • the secure module is arranged between a display device and a computer by means of a passive connection component that guarantees that the display device and the secure module receive the same data.
  • the present invention tackles the same problem as the European patent application EP 1054364 A2 and the German patent application DE 19811720 Al mentioned above.
  • the present invention offers an alternative solution that is more flexible and in many aspects simpler than the previously known solutions.
  • An object of the present invention is thus to provide a device for signing electronic documents digitally such that it is guaranteed that the document that is displayed actually is the document that is signed.
  • the present invention solves the problem mentioned above by means of a device for signing electronic documents digitally that is tamperproof since it is a frozen environment.
  • a frozen environment is meant that the device includes a processor that operates according to instructions that, for instance, are stored in permanent memory, such as ROM (Read-only-memory) or implemented in hardware (or a combination of the two), and thus are impossible to change by means of normal reprogramming, i.e. the instructions are frozen.
  • the device further includes a display that is governed by the processor, means for creating a digital signature, an input device that allows a user to initiate signing of a displayed document and a communication interface for communicating with an external unit to send or receive electronic documents.
  • the display is governed by a processor that operates according to frozen instructions it is not possible to, for instance, infect the device with a virus that causes the signed document to differ from the document that is signed.
  • the present invention also relates to use of the device according to the present invention for signing electronic documents digitally.
  • An embodiment of the invention provides a device that includes a crypto engine, which is particularly suited for performing the calculations necessary in order to create the digital signature and/or for enabling the use of encrypted communication via the communication interface.
  • An advantage of the present invention is that it provides a more direct connection between the document to be signed and the digital signature. Since the present invention guarantees that the document that the user can see on the display is the same that he signs the present invention makes digital signatures more reliable, which is a necessity if digital signatures are to be recognised as legally binding.
  • Another advantage with the present invention is that it is flexible since the device that is used to create the digital signature is not locked to an individual computer or other type of unit.
  • the device only needs to be able to communicate with an external unit to receive the document to be signed from an external unit but is otherwise able to operate independently of the external unit in the signing procedure.
  • the device can be arranged to communicate with any computer or server anywhere in the world, by means of standard communication methods.
  • the device according to the present invention uses a very simple request-response cycle according to some known communications standard to communicate with external units such as a computer. It is thus easy for existing units to co-operate with the device according to the present invention in order to receive signed documents or to send documents to be signed.
  • a further advantage of the present invention is that it does not require encrypted communication for the sake of making the digital signature secure.
  • Encrypted communication can be used in connection with the invention in order to ascertain that an unauthorised person can not see what is signed, but the encrypted communication is not necessary to guarantee that the signing is carried out correctly on the right document.
  • Fig. 1 shows a block diagram over an embodiment of a device for digital signing according to the present invention.
  • Fig. 2 shows a simplified view of an embodiment of a device for digital signing according to the present invention.
  • Fig. 3 shows a simplified view of an alternative embodiment of a device for digital signing according to the present invention.
  • Fig. 4 shows a flow chart over a method of performing digital signing by means of a device for digital signing according to the present invention.
  • Fig. 1 shows a block diagram of an embodiment of a device 1 for digital signing according to the present invention.
  • the device 1 is a hardware unit that includes a processor 2 that operates according to instructions that are frozen. That means that the instructions are stored such that they cannot be altered by means of normal reprogramming. "Normal reprogramming" is here intended to mean the kind of programming action that takes place without physically opening the device 1 and manipulating its components, i.e. piOgramming using electrical signals that are received and interpreted by the device.
  • the device 1 can be turned into a frozen environment by means of storing the processor instructions in permanent memory such as ROM (Read Only Memory) or implement them in hardware. Alternatively the processor is implemented to work according to a combination of hardware implemented instructions and instructions stored in permanent memory.
  • EPROM Erasable and Programmable Read Only Memory
  • the EPROM only allows reprogramming by means of physical manipulation of the hardware of the memory, which would require taking the device 1 apart.
  • the idea behind implementing the processor 2 in this way is to make the device 1 as tamper proof as possible. If the processor instructions are frozen it is impossible to change the function of the device 1 by means of simple reprogramming of software.
  • the device 1 further includes a display 3 and an input device 4.
  • the display 3 is for displaying the electronic document to be signed.
  • the processor 2 governs what the display 3 displays. Since the processor 2 is working according to frozen instructions, a user of the device 1 will not have to worry about that the device may be infected with e.g. a virus that causes the device to display one document and sign another.
  • the input device 4 is for allowing the user to initiate signing of a displayed document. The input device may further allow the user to scroll up and down a document, to choose which document to display etc.
  • the input device comprises a signing button that the user presses to initiate signing of a document.
  • the user may for instance initiate signing by means of entering a personal pin code on an alphanumeric keyboard of the input device 4 or by means of performing a biometric check, such as a check of the user's fingerprint on a fingerprint recognition sensor of the input device 4.
  • the input device 4 will thus have to be equipped with means that suit the type of signing initiation and user identity check in use.
  • the input device 4 may thus comprise e.g. a keyboard, a touch-screen and/or a biometric recognition sensor.
  • the device 1 also includes a communication interface 9.
  • the communication interface 9 is used to communicate with external units such as a computer 10 via a communications link 11.
  • the computer 10 can access the functionality of the device 1 through the communication interface, which may be defined by an API (Application Programming Interface).
  • the communications link 11 may be a wireline connection established on a cable, or a wireless connection.
  • the communication interface 9 may be arranged for communication according to well-known communications standards such as Bluetooth, USB, Ethernet, IrDA, Wireless LAN, RS232 and Firewire.
  • the device 1 needs to be able to communicate with external units, since it needs to receive an electronic document to be signed and to send the electronic document do a suitable receiver (such as the computer 10) after the document has been signed in the device 1. This is possible thanks to the communication interface 9.
  • the device 1 must also comprise means for creating a digital signature. Such means are known per se and will therefore not be explained in detail here.
  • the means for creating a digital signature may for instance comprise a key and certificate storage 5 and a clock unit 6.
  • the storage 5 may the user's private key and certificate be stored.
  • the clock unit may be used for providing the digital signature with a time stamp in a manner known to a person skilled in the art.
  • the processor 2 is also adapted to perform the calculations that are necessary in order to create a digital signature. Such calculations may for instance comprise calculation of a hash value to represent the document to be signed.
  • the processor 2 is further able to assemble the components of die digital signature and to append the signature with the electronic document to be signed.
  • the device 1 further includes a memory 7 for storing one or several documents to be signed. Even though the memory 7 can be arranged to store several documents, the device 1 is arranged to perform digital signing on one document at a time. If the memory is arranged to store several documents at a time the device 1 may be provided with an input device 4 that allows the user to choose which document to view among the documents stored in the memory 7.
  • the device 1 may optionally be arranged to include a so-called crypto engine 8.
  • the crypto engine 8 is a processor or a hardware unit particularly adapted to perform encryption-related calculations.
  • the crypto engine 8 is thus particularly suited to relieve the processor 2 of the calculations that are necessary in order to create the digital signature.
  • the device 1 may optionally be arranged to use encryption when communicating with external units. If the device includes a crypto engine 8, the crypto engine 8 may be arranged to handle the encryption and decryption of communicated information. Otherwise the processor 2 handles the encryption and decryption involved.
  • the device 1 may be implemented to store distinct sets of cryptographic keys used in connection with communication with different applications and for different purposes. The reason for using encrypted communication is not to make the signing procedure itself safer but to prevent other parties from "listening in” on what is signed. The signing procedure itself that takes place in the device 1 is thus just as safe irrespective of whether encrypted communication is used or not when communicating with other units.
  • the device 1 is essentially tamper proof since it constitutes a frozen environment.
  • the only possibility to manipulate the device 1 is to manipulate its hardware, for instance by means of replacing circuits in the device 1 with other circuits.
  • Such manipulation should be difficult since the device 1 is intended to, preferably be a small handheld personal belonging of the user, which hopefully is stored and handled in a manner such that it is unavailable to other people.
  • Fig. 2 and Fig. 3 illustrate examples of physical appearance of the device 1.
  • the embodiment of the device 1 shown in Fig. 2 has a body 12, which on a front is provided with the display 3.
  • the input device 4 is made up of keys 13 adjacent to the display 3 and a finger print reader 14.
  • the keys 13 include arrow keys for scrolling up and down in the displayed document.
  • the body 12 is also provided with a plug 15 for plugging in a cable to allow communication with another unit, such as a computer.
  • the other components of the device 1 are hidden in the interior of the body 12.
  • the embodiment of the device 1 shown in Fig. 3 has a foldable body 16, provided with the display 3 on a front of a first part 16a.
  • the input device 4 is made up of a keyboard 17 provided on a second part 16b of the body 16. Attached to the body 16 is an antenna 18 for wireless communication with other units.
  • the other components of the device 1 are hidden in the interior of the body 15.
  • Fig. 2 and Fig. 3 are only two examples of what the device 1 may look like. The person skilled in the art will appreciate that many other designs of the physical appearance of the device 1 are possible.
  • Fig. 4 shows a flow chart of an example of how digital signing using the device 1 may be carried out.
  • a first step 21 an electronic document to be signed is downloaded from the computer 10 to the device 1, via the communication interface 9.
  • the document may be in a well-defined format, e.g. XML or PDF.
  • the downloading of the document may take place as a result of a request from the computer.
  • the document (or a legible representation of the document) is rendered by the processor 2 and presented on the display 3 for visual inspection by the user. After inspection, the user initiates the digital signing of the document by means of entering an authorisation command on the input device 4, step 23.
  • the authorisation command may, as explained above, involve entering a PIN code on an alphanumeric keyboard or utilising a biometric recognition sensor.
  • the device then performs all the functions involved in creating the digital signature such as for instance calculating a hash value, time stamping, assembling the signature parts and appending the signature to the document, step 24.
  • a step 25 is the signed document returned to the computer via the communications interface 9.
  • step 21 and the step 25 will involve decryption and encryption respectively.
  • the ability of the device to communicate with other units depends on how the communications interface is implemented.
  • the device may be implemented with a communications interface that is suitable only for wireline communication with a computer to which it is directly connected or it may be implemented with mobile communication functionality that allows the device to communicate with a computer located on the other side of the world via a mobile communications network.
  • the device may thus be implemented with a varying range of communication depending on which type of communications technology the communication interface is implemented for.
  • the device of the present invention is intended to be a personal belonging of the user, that the user can bring with him and use in connection with many different individual computers or other types of terminals from which the device may receive documents for signing.
  • the device of the present invention is thus not tied to an individual unit, such as a computer, but can communicate with any other unit that uses or can interpret the type of communications standard that the communication interface 9 uses.
  • the device 1 may be combined with a mobile phone or a PDA (Personal Digital Assistant).
  • a mobile phone or a PDA Personal Digital Assistant
  • the display and input device of the mobile phone or PDA is preferably used both for digital signing purposes and for supporting the particular mobile phone or PDA functionality.
  • the display and the input device must each have a direct connection with the chip containing the signing functionality in order to maintain the high level of security regarding signing that is the aim of the invention.
  • the combined signing device and mobile phone/PDA should also be provided with means for indicating to the user when the chip containing the signing functionality has assumed control over the display and the input device.
  • the user can be certain that when a document is to be signed, the "frozen" processor implemented in the chip, controls the display and input device, and guarantees that the same document is displayed and signed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The present invention relates to a device (1) for signing electronic documents digitally, which device is arranged to guarantee that the document that is displayed on a display (3) of the device is the document that is signed. The device includes a processor (2) that operates according to instructions that are frozen since they, for instance, are stored in ROM or implemented in hardware. The display (3) is governed by the processor (2) to display the same document that is intended for signing. The device (1) further includes means for creating a digital signature (2, 5, 6, 8), an input device (4) that allows a user to initiate signing of a displayed document and a communication interface (9) for communicating with an external unit to send or receive electronic documents. The present invention also relates to use of the device for signing electronic documents digitally.

Description

DEVICE FOR DIGITALLY SIGNING ELECTRONIC DOCUMENTS
FIELD OF THE INVENTION
The present invention relates to an arrangement for signing electronic documents digitally. The present invention also relates to a use of an arrangement for signing electronic documents digitally. In particular, the invention relates to measures for assuring that a displayed electronic document is the very document that is signed digitally.
BACKGROUND OF THE INVENTION
Documents that previously were produced as paper documents are today often produced in the form of electronic documents. An electronic document is here intended to mean any collection of bits, such as an electronic text document, an electronic business transaction, an electronic message of some type or a file. In order to solve the problem that handwritten signatures are not applicable on electronic documents, the digital signature was invented in the 1970s. Digital signatures are produced using complicated mathematics, which guarantees that the signature is unforgeable and uncopyable. In order to sign a document digitally a person A to sign the document has to have a private key that is secret to any other person. When the person A is to sign the electronic document he/she performs a mathematical calculation using the document and the private key. The result of the calculation, is the digital signature that is appended to the document. The person A also has a public key that is publicly available. The public key allows anyone to verify that the digital signature really was produced by the person A. This is done by means of performing a different calculation using the signed document and the public key. Since the person A alone knows his/her own private key the document must have been signed by him/her if the verification calculation checks out.
A handwritten signature on a document is generally used to indicate that the person who has signed the document agrees to the document or acknowledges that he/she has seen it. The handwritten signature has an important legal status and can serve as evidence in court.
In many countries, the digital signature is now legally binding, just as the handwritten signature. Many people claim that this is unfortunate since they claim that there are many security issues left to solve before digital signatures become nearly as safe as handwritten signatures.
The tool used to produce the digital signature is generally a computer. It is the computer that performs the calculation necessary for signing and it is the computer that presents the electronic document to be signed and possibly transmits the signed document. If the computer can not be trusted, neither can the electronic document and the digital signature.
The international patent application WO 98/52151 aims at improving security when sensitive information is transmitted over a communications network, such as the Internet. When the Internet is used for banking services, transaction messages that contain very sensitive information, such as credit card numbers, are transferred between computers or servers. Methods and equipment that allow a user control over the creation of the transaction message are shown in the application. The transaction message is created by means of using a smart card that is inserted in a reader of a computer, a mobile phone or a terminal in a shop. The smart card contains a private key and the transaction message is created either in the smart card or in the computer and then signed using the private key stored in the smart card. WO 98/52151 deals with the problem of giving the user control over the contents of a transaction message by means of letting the user himself create the message preferably off-line.
A problem with digital signatures that the above mentioned international publication does not tackle is how to make sure that the user actually signs the document (or message) that he thinks he signs. There is not much use in controlling the contents of a transaction message if the computer holds a hidden message on which it performs the digital signing procedure instead of on the message that the user has created. This is possible since computers contain software that easily can be tampered with. Programs can be written that cause the computer to display one message and sign another. There are also programs that steal the user's private key and use it to sign documents without the user's knowledge. More detailed information regarding this can be found on the Internet page http://www.counterpane.eom/crypto-gram-0011.html#l (we refer to the information found on this page on March 3, 2001).
There is thus the problem that the digital signature does not provide a link between the signing person and the document to be signed in the way that a handwritten signature does. This can cause a person's signature to end up on an electronic document that the person has never seen.
The European patent application EP 1054364 A2 and the German patent application DE 19811720 Al aims at solving this problem by means of securing that what is displayed is what is signed.
The European patent application EP 1054364 A2 solves the problem by means of creating a close relationship between a trusted display device and a chip card belonging to the person to sign a document. The close relationship between the display device and the chip card is achieved since the chip card knows the public key of the display device and vice versa. The display device and chip card co- operate in the signing procedure and communicate using encrypted messages that can be decrypted since the parts know each others public keys.
The German patent application DE 19811720 Al solves the problem by means of providing a secure module in which the private key is stored. The secure module is arranged between a display device and a computer by means of a passive connection component that guarantees that the display device and the secure module receive the same data.
SUMMARY OF THE INVENTION
The present invention tackles the same problem as the European patent application EP 1054364 A2 and the German patent application DE 19811720 Al mentioned above. However the present invention offers an alternative solution that is more flexible and in many aspects simpler than the previously known solutions.
An object of the present invention is thus to provide a device for signing electronic documents digitally such that it is guaranteed that the document that is displayed actually is the document that is signed.
The above mentioned object of the present invention is achieved by the inventive features that are stated in the accompanying claims.
The present invention solves the problem mentioned above by means of a device for signing electronic documents digitally that is tamperproof since it is a frozen environment. With a frozen environment is meant that the device includes a processor that operates according to instructions that, for instance, are stored in permanent memory, such as ROM (Read-only-memory) or implemented in hardware (or a combination of the two), and thus are impossible to change by means of normal reprogramming, i.e. the instructions are frozen. The device further includes a display that is governed by the processor, means for creating a digital signature, an input device that allows a user to initiate signing of a displayed document and a communication interface for communicating with an external unit to send or receive electronic documents.
Since the display is governed by a processor that operates according to frozen instructions it is not possible to, for instance, infect the device with a virus that causes the signed document to differ from the document that is signed.
The present invention also relates to use of the device according to the present invention for signing electronic documents digitally.
An embodiment of the invention provides a device that includes a crypto engine, which is particularly suited for performing the calculations necessary in order to create the digital signature and/or for enabling the use of encrypted communication via the communication interface.
An advantage of the present invention is that it provides a more direct connection between the document to be signed and the digital signature. Since the present invention guarantees that the document that the user can see on the display is the same that he signs the present invention makes digital signatures more reliable, which is a necessity if digital signatures are to be recognised as legally binding.
Another advantage with the present invention is that it is flexible since the device that is used to create the digital signature is not locked to an individual computer or other type of unit. The device only needs to be able to communicate with an external unit to receive the document to be signed from an external unit but is otherwise able to operate independently of the external unit in the signing procedure. The device can be arranged to communicate with any computer or server anywhere in the world, by means of standard communication methods.
Yet another advantage with the present invention is that it provides a simple solution. The device according to the present invention uses a very simple request-response cycle according to some known communications standard to communicate with external units such as a computer. It is thus easy for existing units to co-operate with the device according to the present invention in order to receive signed documents or to send documents to be signed.
A further advantage of the present invention is that it does not require encrypted communication for the sake of making the digital signature secure. Encrypted communication can be used in connection with the invention in order to ascertain that an unauthorised person can not see what is signed, but the encrypted communication is not necessary to guarantee that the signing is carried out correctly on the right document.
The invention will now be described with the aid of preferred embodiments and with reference to accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 shows a block diagram over an embodiment of a device for digital signing according to the present invention.
Fig. 2 shows a simplified view of an embodiment of a device for digital signing according to the present invention.
Fig. 3 shows a simplified view of an alternative embodiment of a device for digital signing according to the present invention. Fig. 4 shows a flow chart over a method of performing digital signing by means of a device for digital signing according to the present invention.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
Fig. 1 shows a block diagram of an embodiment of a device 1 for digital signing according to the present invention. The device 1 is a hardware unit that includes a processor 2 that operates according to instructions that are frozen. That means that the instructions are stored such that they cannot be altered by means of normal reprogramming. "Normal reprogramming" is here intended to mean the kind of programming action that takes place without physically opening the device 1 and manipulating its components, i.e. piOgramming using electrical signals that are received and interpreted by the device. The device 1 can be turned into a frozen environment by means of storing the processor instructions in permanent memory such as ROM (Read Only Memory) or implement them in hardware. Alternatively the processor is implemented to work according to a combination of hardware implemented instructions and instructions stored in permanent memory. It is also possible to store the processor instructions in EPROM (Erasable and Programmable Read Only Memory). The EPROM only allows reprogramming by means of physical manipulation of the hardware of the memory, which would require taking the device 1 apart. The idea behind implementing the processor 2 in this way is to make the device 1 as tamper proof as possible. If the processor instructions are frozen it is impossible to change the function of the device 1 by means of simple reprogramming of software.
In the future, it may be possible to store the processor instructions in other ways than the examples mentioned above, which offer the same type of frozen environment as for instance ROM and EPROM. The device 1 further includes a display 3 and an input device 4. The display 3 is for displaying the electronic document to be signed. The processor 2 governs what the display 3 displays. Since the processor 2 is working according to frozen instructions, a user of the device 1 will not have to worry about that the device may be infected with e.g. a virus that causes the device to display one document and sign another. The input device 4 is for allowing the user to initiate signing of a displayed document. The input device may further allow the user to scroll up and down a document, to choose which document to display etc. How the user initiates signing of a document may vary between different embodiments of the device 1. In its simplest form the input device comprises a signing button that the user presses to initiate signing of a document. However for security reasons it is preferable to initiate signing in a fashion that involves some kind of identity check of the user. The user may for instance initiate signing by means of entering a personal pin code on an alphanumeric keyboard of the input device 4 or by means of performing a biometric check, such as a check of the user's fingerprint on a fingerprint recognition sensor of the input device 4. The input device 4 will thus have to be equipped with means that suit the type of signing initiation and user identity check in use. The input device 4 may thus comprise e.g. a keyboard, a touch-screen and/or a biometric recognition sensor.
The device 1 also includes a communication interface 9. The communication interface 9 is used to communicate with external units such as a computer 10 via a communications link 11. The computer 10 can access the functionality of the device 1 through the communication interface, which may be defined by an API (Application Programming Interface). The communications link 11 may be a wireline connection established on a cable, or a wireless connection. The communication interface 9 may be arranged for communication according to well-known communications standards such as Bluetooth, USB, Ethernet, IrDA, Wireless LAN, RS232 and Firewire. The device 1 needs to be able to communicate with external units, since it needs to receive an electronic document to be signed and to send the electronic document do a suitable receiver (such as the computer 10) after the document has been signed in the device 1. This is possible thanks to the communication interface 9.
The device 1 must also comprise means for creating a digital signature. Such means are known per se and will therefore not be explained in detail here. The means for creating a digital signature may for instance comprise a key and certificate storage 5 and a clock unit 6. In the storage 5 may the user's private key and certificate be stored. The clock unit may be used for providing the digital signature with a time stamp in a manner known to a person skilled in the art. The processor 2 is also adapted to perform the calculations that are necessary in order to create a digital signature. Such calculations may for instance comprise calculation of a hash value to represent the document to be signed. The processor 2 is further able to assemble the components of die digital signature and to append the signature with the electronic document to be signed.
The device 1 further includes a memory 7 for storing one or several documents to be signed. Even though the memory 7 can be arranged to store several documents, the device 1 is arranged to perform digital signing on one document at a time. If the memory is arranged to store several documents at a time the device 1 may be provided with an input device 4 that allows the user to choose which document to view among the documents stored in the memory 7.
The device 1 may optionally be arranged to include a so-called crypto engine 8. The crypto engine 8 is a processor or a hardware unit particularly adapted to perform encryption-related calculations. The crypto engine 8 is thus particularly suited to relieve the processor 2 of the calculations that are necessary in order to create the digital signature.
The device 1 may optionally be arranged to use encryption when communicating with external units. If the device includes a crypto engine 8, the crypto engine 8 may be arranged to handle the encryption and decryption of communicated information. Otherwise the processor 2 handles the encryption and decryption involved. The device 1 may be implemented to store distinct sets of cryptographic keys used in connection with communication with different applications and for different purposes. The reason for using encrypted communication is not to make the signing procedure itself safer but to prevent other parties from "listening in" on what is signed. The signing procedure itself that takes place in the device 1 is thus just as safe irrespective of whether encrypted communication is used or not when communicating with other units.
The device 1 is essentially tamper proof since it constitutes a frozen environment. The only possibility to manipulate the device 1 is to manipulate its hardware, for instance by means of replacing circuits in the device 1 with other circuits. Such manipulation should be difficult since the device 1 is intended to, preferably be a small handheld personal belonging of the user, which hopefully is stored and handled in a manner such that it is unavailable to other people. In order to make manipulation even more difficult, it is advantageous to implement the device 1 with a sealed body. Thereby the user can suspect manipulation if he detects that the seal is broken.
Fig. 2 and Fig. 3 illustrate examples of physical appearance of the device 1.
The embodiment of the device 1 shown in Fig. 2 has a body 12, which on a front is provided with the display 3. The input device 4 is made up of keys 13 adjacent to the display 3 and a finger print reader 14. The keys 13 include arrow keys for scrolling up and down in the displayed document. The body 12 is also provided with a plug 15 for plugging in a cable to allow communication with another unit, such as a computer. The other components of the device 1 are hidden in the interior of the body 12.
The embodiment of the device 1 shown in Fig. 3 has a foldable body 16, provided with the display 3 on a front of a first part 16a. The input device 4 is made up of a keyboard 17 provided on a second part 16b of the body 16. Attached to the body 16 is an antenna 18 for wireless communication with other units. The other components of the device 1 are hidden in the interior of the body 15.
The embodiments of the device 1 shown in Fig. 2 and Fig. 3 are only two examples of what the device 1 may look like. The person skilled in the art will appreciate that many other designs of the physical appearance of the device 1 are possible.
Fig. 4 shows a flow chart of an example of how digital signing using the device 1 may be carried out. In a first step 21 an electronic document to be signed is downloaded from the computer 10 to the device 1, via the communication interface 9. The document may be in a well-defined format, e.g. XML or PDF. The downloading of the document may take place as a result of a request from the computer. In a next step 22, the document (or a legible representation of the document) is rendered by the processor 2 and presented on the display 3 for visual inspection by the user. After inspection, the user initiates the digital signing of the document by means of entering an authorisation command on the input device 4, step 23. The authorisation command may, as explained above, involve entering a PIN code on an alphanumeric keyboard or utilising a biometric recognition sensor. The device then performs all the functions involved in creating the digital signature such as for instance calculating a hash value, time stamping, assembling the signature parts and appending the signature to the document, step 24. In a step 25 is the signed document returned to the computer via the communications interface 9.
If encryption is used in the communication with the computer the step 21 and the step 25 will involve decryption and encryption respectively.
The ability of the device to communicate with other units depends on how the communications interface is implemented. The device may be implemented with a communications interface that is suitable only for wireline communication with a computer to which it is directly connected or it may be implemented with mobile communication functionality that allows the device to communicate with a computer located on the other side of the world via a mobile communications network. The device may thus be implemented with a varying range of communication depending on which type of communications technology the communication interface is implemented for.
The device of the present invention is intended to be a personal belonging of the user, that the user can bring with him and use in connection with many different individual computers or other types of terminals from which the device may receive documents for signing. The device of the present invention is thus not tied to an individual unit, such as a computer, but can communicate with any other unit that uses or can interpret the type of communications standard that the communication interface 9 uses.
In an alternative embodiment the device 1 may be combined with a mobile phone or a PDA (Personal Digital Assistant). In that case, it is advantageous to implement the components of the device, except for the display and the input device, as a single chip that is incorporated in the mobile phone or the PDA. The display and input device of the mobile phone or PDA is preferably used both for digital signing purposes and for supporting the particular mobile phone or PDA functionality. The display and the input device must each have a direct connection with the chip containing the signing functionality in order to maintain the high level of security regarding signing that is the aim of the invention. The combined signing device and mobile phone/PDA should also be provided with means for indicating to the user when the chip containing the signing functionality has assumed control over the display and the input device. Thus the user can be certain that when a document is to be signed, the "frozen" processor implemented in the chip, controls the display and input device, and guarantees that the same document is displayed and signed.

Claims

1. A device (1) for signing electronic documents digitally, which device includes a processor (2) and means (2, 5, 6, 8) for creating a digital signature characterised in that the device further includes a display (3) for displaying the electronic document to be signed, which display has a connection with said processor for receiving display instructions, a communication interface (9) for comrnunicating with other units to receive an electronic document to be signed and to send a signed electronic document, and an input device (4) for allowing a user to input a command that initiates the digital signing; and in that the processor (2) is arranged to work according to instructions that are frozen such that the function of the processor can not be altered by means of normal reprogramming.
2. The device (1) for signing electronic documents digitally according to claim 1, characterised in that the processor instructions are stored in ROM (Read Only Memory).
3. The device (1) for signing electronic documents digitally according to claim 1, characterised in that the processor instructions are stored in EPROM
(Erasable and Programmable Read Only Memory).
4. The device (1) for signing electronic documents digitally according to claim 1, characterised in that the processor instructions are implemented in hardware.
5. The device (1) for signing electronic documents digitally according to claim 1, characterised in that one part of the processor instructions are stored in ROM and/or EPROM and the rest of the processor instructions are implemented in hardware.
6. The device for signing electronic documents digitally according to any of claims 1-5, characterised in that the device also includes a memory (7) for storing one or several documents to be signed.
7. The device for signing electronic documents digitally according to any of claims 1-6, characterised in that the device further includes a crypto engine (8).
8. The device for signing electronic documents digitally according to any of claims 1-7, characterised in that the device is arranged to enable the use of encryption for the communication that is carried out via the communication interface (9) .
9. The device for signing electronic documents digitally according to any of claims 1-8, characterised in that the communication interface (9) is adapted for wireline and/or wireless communication.
10. The device for signing electronic documents digitally according to any of claims 1-9, characterised in that the communication interface (9) is adapted for communication according to one or several of the standards: Bluetooth, USB, Ethernet, IrDA, Wireless LAN, RS232 and Fkewire.
11. The device for signing electronic documents digitally according to any of claims 1-10, characterised in that the input device (4) includes a keyboard (17) comprising at least one key.
12. The device for signing electronic documents digitally according to any of claims 1-11, characterised in that the input device (4) includes a biometric recognition sensor (14).
13. The device for signing electronic documents digitally according to any of claims 1-12, characterised in that the input device (4) includes a touch screen.
14. The device for signing electronic documents digitally according to any of claims 1-13, characterised in that the device (1) further includes means for providing the device with mobile phone functionality.
15. The device for signing electronic documents digitally according to any of claims 1-14, characterised in that the device (1) further includes means for providing the device with PDA (Personal Digital Assistant) functionality.
16. Use of a device according to any of claims 1-15 for signing an electronic document digitally.
PCT/SE2001/000958 2001-05-04 2001-05-04 Device for digitally signing electronic documents WO2002091669A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SE2001/000958 WO2002091669A1 (en) 2001-05-04 2001-05-04 Device for digitally signing electronic documents

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2001/000958 WO2002091669A1 (en) 2001-05-04 2001-05-04 Device for digitally signing electronic documents

Publications (1)

Publication Number Publication Date
WO2002091669A1 true WO2002091669A1 (en) 2002-11-14

Family

ID=20283430

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2001/000958 WO2002091669A1 (en) 2001-05-04 2001-05-04 Device for digitally signing electronic documents

Country Status (1)

Country Link
WO (1) WO2002091669A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852469A1 (en) * 2003-03-11 2004-09-17 Mathieu Arnaud Data encryption/decryption method, for data transmission, involves identification of the operator, and implementing encryption algorithm for which the encryption key once programmed becomes inaccessible
US20090199006A1 (en) * 2008-02-01 2009-08-06 Maik Stohn Method and Device for Secure Mobile Electronic Signature
GB2475033A (en) * 2009-10-15 2011-05-11 Mario Guido Finetti Transaction Verification Token
FR2984546A1 (en) * 2011-12-16 2013-06-21 Thales Sa Peripheral device for labeling of XML file of user, has file certification module arranged with filtering module, and physical exchanger and storage zone arranged with display software for displaying contents of file
US8959354B2 (en) 2010-03-31 2015-02-17 International Business Machines Corporation Method, secure device, system and computer program product for digitally signing a document
US9698992B2 (en) 2012-10-15 2017-07-04 Obshestvo S Ogranichennoj Otvetstvennostyu “Laboratoriya Elandis” Method for signing electronic documents with an analog-digital signature with additional verification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000059177A1 (en) * 1999-03-31 2000-10-05 British Telecommunications Public Limited Company Server computer for guaranteeing files integrity
WO2000073879A1 (en) * 1999-05-28 2000-12-07 Hewlett-Packard Company System for digitally signing a document

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000059177A1 (en) * 1999-03-31 2000-10-05 British Telecommunications Public Limited Company Server computer for guaranteeing files integrity
WO2000073879A1 (en) * 1999-05-28 2000-12-07 Hewlett-Packard Company System for digitally signing a document

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852469A1 (en) * 2003-03-11 2004-09-17 Mathieu Arnaud Data encryption/decryption method, for data transmission, involves identification of the operator, and implementing encryption algorithm for which the encryption key once programmed becomes inaccessible
US20090199006A1 (en) * 2008-02-01 2009-08-06 Maik Stohn Method and Device for Secure Mobile Electronic Signature
EP2088531A1 (en) * 2008-02-01 2009-08-12 Novosec Ag Method and device for secure mobile electronic signature
GB2475033A (en) * 2009-10-15 2011-05-11 Mario Guido Finetti Transaction Verification Token
US8959354B2 (en) 2010-03-31 2015-02-17 International Business Machines Corporation Method, secure device, system and computer program product for digitally signing a document
FR2984546A1 (en) * 2011-12-16 2013-06-21 Thales Sa Peripheral device for labeling of XML file of user, has file certification module arranged with filtering module, and physical exchanger and storage zone arranged with display software for displaying contents of file
US9698992B2 (en) 2012-10-15 2017-07-04 Obshestvo S Ogranichennoj Otvetstvennostyu “Laboratoriya Elandis” Method for signing electronic documents with an analog-digital signature with additional verification

Similar Documents

Publication Publication Date Title
US6829711B1 (en) Personal website for electronic commerce on a smart java card with multiple security check points
US8099769B2 (en) System and method for trusted communication
JP2001526857A (en) Method and system for accessing electronic resources via machine-readable data on intelligent documents
WO2005045617A3 (en) Portable security transaction protocol
WO2010037430A1 (en) Method and device for electronically capturing a handwritten signature using embedding technique
EP2188942A2 (en) Information protection device
IL94633A (en) System for transferring key encrypted data between computers
CN101334915A (en) Biometric authentication apparatus, terminal device and automatic transaction machine
US20110202772A1 (en) Networked computer identity encryption and verification
US20090199006A1 (en) Method and Device for Secure Mobile Electronic Signature
US20100170942A1 (en) Method and system for increasing security in the creation of electronic signatures by means of a chip card
WO2005117527A2 (en) An electronic device to secure authentication to the owner and methods of implementing a global system for highly secured authentication
CN100492247C (en) Method for protection against fraudulent modification of data and corresponding equipment and intelligent card
US6904524B1 (en) Method and apparatus for providing human readable signature with digital signature
WO2002091669A1 (en) Device for digitally signing electronic documents
JP5135331B2 (en) PC external signature apparatus having wireless communication capability
US7386727B1 (en) Method for digital signing of a message
US20040049679A1 (en) Authenticating method and device
EP2350913B1 (en) Method and device for electronically capturing a handwritten signature using embedding technique
Ortiz-Yepes Enhancing Authentication in eBanking with NFC-enabled mobile phones
EP2573702A2 (en) Internet transaction security
CN1889420B (en) Method for realizing encrypting
WO2012123859A1 (en) Transaction security method and device
EP2342671B1 (en) Method for information interaction and secure device
WO2007042608A1 (en) Method, devices and arrangement for authenticating a connection using a portable device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642