EN 419212-2:2017
(Main)Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
This part specifies mechanisms for SEs to be used as qualified signature creation devices covering:
• Signature creation and mobile signature creation
• User verification
• Password based authentication
The specified mechanisms are suitable for other purposes like services in the context of EU Regulation 910/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC.
The particular case of seal is also covered by the specification. The differences between seal and signature are exposed in Annex B. Annex B also explains how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices.
Mobile signature is an alternative to the classical signature case which is performed by a secure element. Mobile signature is encouraged by the large widespread of mobile devices and the qualification authorized by the eIDAS Regulation. The particular case of remote signature (or server signing) is covered by this specification in Annex C.
In the rest of this document, except Annex B, there will be no particular notion of a seal since it technically compares to the signature.
Anwendungsschnittstelle für sichere Elemente zur elektronischen Identifikation, Authentisierung und für vertrauenswürdige Dienste - Teil 2: Signatur- und Siegeldienste
Identification personnelle et dispositifs associés, éléments de sécurité, systèmes, opérations et protection de la vie privée dans un environnement multisectoriel - Partie 2 : Services de signatures et de cachets
La présente partie spécifie les mécanismes pour l'utilisation de SE comme dispositifs de création de signatures qualifiés, qui recouvrent :
la création de signatures et création de signatures mobiles ;
la vérification de l’utilisateur ;
l’authentification par mot de passe.
Les mécanismes spécifiés conviennent à d'autres objectifs, tels que les services dans le cadre de [2].
Le cas particulier du cachet est également traité par la spécification. Les différences entre cachet et signature sont présentées dans l’Annexe B. L’Annexe B explique également comment les mécanismes des SE servant de dispositifs de création de signatures qualifiés peuvent être utilisés pour les SE servant de dispositifs de création de cachets qualifiés.
La signature mobile est une variante de la signature traditionnelle qui est exécutée par un élément de sécurité. La signature mobile bénéficie de la grande diffusion des dispositifs mobiles et de la qualification autorisée par le Règlement eIDAS [2]. Le cas particulier de la signature à distance (ou signature par serveur) est traité par la présente spécification dans l’Annexe C.
Dans la suite du présent document, à l’exception de l’Annexe B, il n’y aura aucune notion particulière relative au cachet, puisque, sur un plan technique, il est comparable à la signature.
Uporabniški vmesnik za varnostne elemente za elektronsko identifikacijo, avtentifikacijo in zanesljivost storitev - 2. del: Podpis in dodatne storitve
Ta del določa mehanizme za uporabo varnostnih elementov (SE) kot kvalificiranih naprav za elektronsko podpisovanje in zajema: • oblikovanje podpisa in mobilno oblikovanje podpisa,
• preverjanje uporabnika,
• preverjanje pristnosti na podlagi gesla.
Opredeljeni mehanizmi so primerni za druge namene, kot so storitve v okviru Uredbe (EU) št. 910/2014 Evropskega parlamenta in sveta z dne 23. julija 2014 o elektronski identifikaciji in storitvah zaupanja za elektronske transakcije na notranjem trgu ter razveljavitve Direktive 1999/93/ES. Specifikacija zajema tudi poseben primer žiga. Razlike med žigom in podpisom so izpostavljene v dodatku B. Dodatek B tudi pojasnjuje, kako se lahko mehanizmi za varnostne elemente kot kvalificirana sredstva za elektronsko podpisovanje uporabljajo za varnostne elemente kot naprave za ustvarjanje kvalificiranega elektronskega žiga. Alternativa običajnemu podpisu je mobilni podpis, ki ga izvede varnostni element. Mobilni podpis se spodbuja zaradi razširjenega obsega mobilnih naprav in kvalifikacij, odobrenih z uredbo o elektronski identifikaciji (eIDAS). Poseben primer podpisa na daljavo (ali strežniškega podpisa) je zajet v tej specifikaciji v dodatku C.
Preostanek dokumenta z izjemo dodatka B posebej ne omenja pomena žiga, saj je v tehničnem smislu podoben podpisu.
General Information
- Status
- Published
- Publication Date
- 12-Dec-2017
- Withdrawal Date
- 29-Jun-2018
- Current Stage
- 9060 - Closure of 2 Year Review Enquiry - Review Enquiry
- Start Date
- 04-Jun-2023
- Completion Date
- 04-Jun-2023
Relations
- Effective Date
- 08-Jun-2022
- Effective Date
- 08-Jun-2022
Overview
EN 419212-2:2017 (EN 419212-2) defines an application interface for secure elements (SEs) used as qualified signature creation devices for electronic identification, authentication and trusted services. Part 2 focuses on Signature and Seal Services, describing mechanisms for signature creation (including mobile signature and the particular case of seals), user verification, and password-based authentication. The specification is aligned with the eIDAS framework (EU Regulation 910/2014) and supports use cases such as qualified electronic signatures, mobile signing and remote/server signing (covered in Annex C). Annex B clarifies differences between signatures and seals and how to reuse signature mechanisms for seal creation.
Key technical topics and requirements
The standard specifies technical requirements and interfaces related to:
- Signature application flow: lifecycle, selection of ESIGN application and cryptographic information applications.
- Trusted vs untrusted environment: guidance for secure execution contexts when interacting with SEs.
- Concurrent usage and channel selection: handling multiple channels and security considerations for simultaneous operations.
- Security environment and key selection: selection and management of keys within SEs and associated security services.
- User verification:
- Knowledge-based (password/PIN) mechanisms, presentation formats, retry/reset semantics.
- Biometric verification workflows and template retrieval.
- Digital Signature Service:
- Signature generation options (where hashing is performed: host, partial, or inside ICC/SE).
- Selection of keys, algorithms and signature input formats.
- Password-based Authentication Protocols (PBM): protocol steps, parameter negotiation, nonce handling and session key derivation.
- Secure Messaging: APDU structures, TLV encoding, cryptographic checksums, sequence counters, and use of symmetric algorithms (TDES/AES, MAC types such as CMAC/EMAC/Retail MAC).
- Key generation and identifiers: generation of signature keys, certificate handling, and public key parameters.
- Algorithm identifiers and formats: mapping AlgIDs, hash formats and DSI formats.
Practical applications
- Implementing qualified electronic signature and seal creation on smartcards, eID tokens and mobile secure elements (SIM, eUICC, SE).
- Enabling mobile signatures and server-side (remote) signing for eIDAS-compliant trust services.
- Building secure messaging channels between host applications and SEs for transaction integrity and confidentiality.
- Protocol development for password-based authentication and biometric verification in secure devices.
Who uses this standard
- Secure element manufacturers and firmware developers
- Smartcard and eSIM solution integrators
- Trust Service Providers (TSPs) and Qualified Trust Service Providers (QTSPs)
- Government eID program architects and PKI engineers
- Mobile network operators and mobile-wallet providers
- Certification bodies and security auditors ensuring eIDAS compliance
Related standards
- EN 419212-1 (Part 1 - Core interface concepts)
- EU Regulation 910/2014 (eIDAS) - legal framework for qualified signatures and trust services
Keywords: secure element, electronic identification, eIDAS, qualified signature creation device, mobile signature, remote signature, digital signature service, secure messaging, password-based authentication, EN 419212-2.
Frequently Asked Questions
EN 419212-2:2017 is a standard published by the European Committee for Standardization (CEN). Its full title is "Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services". This standard covers: This part specifies mechanisms for SEs to be used as qualified signature creation devices covering: • Signature creation and mobile signature creation • User verification • Password based authentication The specified mechanisms are suitable for other purposes like services in the context of EU Regulation 910/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. The particular case of seal is also covered by the specification. The differences between seal and signature are exposed in Annex B. Annex B also explains how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices. Mobile signature is an alternative to the classical signature case which is performed by a secure element. Mobile signature is encouraged by the large widespread of mobile devices and the qualification authorized by the eIDAS Regulation. The particular case of remote signature (or server signing) is covered by this specification in Annex C. In the rest of this document, except Annex B, there will be no particular notion of a seal since it technically compares to the signature.
This part specifies mechanisms for SEs to be used as qualified signature creation devices covering: • Signature creation and mobile signature creation • User verification • Password based authentication The specified mechanisms are suitable for other purposes like services in the context of EU Regulation 910/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. The particular case of seal is also covered by the specification. The differences between seal and signature are exposed in Annex B. Annex B also explains how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices. Mobile signature is an alternative to the classical signature case which is performed by a secure element. Mobile signature is encouraged by the large widespread of mobile devices and the qualification authorized by the eIDAS Regulation. The particular case of remote signature (or server signing) is covered by this specification in Annex C. In the rest of this document, except Annex B, there will be no particular notion of a seal since it technically compares to the signature.
EN 419212-2:2017 is classified under the following ICS (International Classification for Standards) categories: 35.240.15 - Identification cards. Chip cards. Biometrics. The ICS classification helps identify the subject area and facilitates finding related standards.
EN 419212-2:2017 has the following relationships with other standards: It is inter standard links to EN 419212-2:2014, EN 419212-1:2014. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
EN 419212-2:2017 is associated with the following European legislation: EU Directives/Regulations: 910/2014; Standardization Mandates: M/460. When a standard is cited in the Official Journal of the European Union, products manufactured in conformity with it benefit from a presumption of conformity with the essential requirements of the corresponding EU directive or regulation.
You can purchase EN 419212-2:2017 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of CEN standards.
Standards Content (Sample)
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Uporabniški vmesnik za varnostne elemente za elektronsko identifikacijo, avtentifikacijo in zanesljivost storitev - 2. del: Podpis in dodatne storitveAnwendungsschnittstelle für sichere Elemente, die als qualifizierte elektronische Signatur-/Siegelerstellungseinheiten verwendet werden - Teil 2: Zusätzliche DiensteApplication Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services35.240.15Identification cards. Chip cards. BiometricsICS:Ta slovenski standard je istoveten z:EN 419212-2:2017SIST EN 419212-2:2018en,fr,de01-april-2018SIST EN 419212-2:2018SLOVENSKI
STANDARDSIST EN 419212-2:2015SIST EN 419212-1:20151DGRPHãþD
EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM
EN 419212-2
December
t r s y ICS
u wä t v rä s w Supersedes EN
v s { t s tæ sã t r s vá EN
v s { t s tæ tã t r s vEnglish Version
Application Interface for Secure Elements for Electronic Identificationá Authentication and Trusted Services æ Part
tã Signature and Seal Services Interface applicative des éléments sécurisés utilisés comme dispositifs de création de signature signatures et de cachets
Anwendungsschnittstelle für sichere Elementeá die als qualifizierte elektronische SignaturæZusätzliche Dienste This European Standard was approved by CEN on
x February
t r s yä
egulations which stipulate the conditions for giving this European Standard the status of a national standard without any alterationä Upætoædate lists and bibliographical references concerning such national standards may be obtained on application to the CENæCENELEC Management Centre or to any CEN memberä
translation under the responsibility of a CEN member into its own language and notified to the CENæCENELEC Management Centre has the same status as the official versionsä
CEN members are the national standards bodies of Austriaá Belgiumá Bulgariaá Croatiaá Cyprusá Czech Republicá Denmarká Estoniaá Finlandá Former Yugoslav Republic of Macedoniaá Franceá Germanyá Greeceá Hungaryá Icelandá Irelandá Italyá Latviaá Lithuaniaá Luxembourgá Maltaá Netherlandsá Norwayá Polandá Portugalá Romaniaá Serbiaá Slovakiaá Sloveniaá Spainá Swedená Switzerlandá Turkey and United Kingdomä
EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre:
Avenue Marnix 17,
B-1000 Brussels
t r s y CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Membersä Refä Noä EN
v s { t s tæ tã t r s y ESIST EN 419212-2:2018
Security environments . 100 Annex B (informative)
Seals and Signatures . 108 Annex C (informative)
Remote Signatures . 111 SIST EN 419212-2:2018
Part 3: “Device Authentication” describes the device authentication protocols and the related key management services to establish a secure channel.
Part 4: “Privacy specific Protocols” describes functions and services to provide privacy to identification services.
Part 5: “Trusted eServices” describes services that may be used in conjunction with signature services described in Part 2.
This document has been prepared under a mandate given to CEN by the European Commission and the European Free Trade Association. According to the CEN-CENELEC Internal Regulations, the national standards organisations of the following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. SIST EN 419212-2:2018
Signature creation and mobile signature creation
User verification
Password based authentication The specified mechanisms are suitable for other purposes like services in the context of [2]. The particular case of seal is also covered by the specification. The differences between seal and signature is exposed in Annex B. Annex B also explains how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices. Mobile signature is an alternative to the classical signature case which is performed by a secure element. Mobile signature is encouraged by the large widespread of mobile devices and the qualification authorized by the eIDAS Regulation [2]. The particular case of remote signature (or server signing) is covered by this specification in Annex C. In the rest of this document, except Annex B, there will be no particular notion of a seal since it technically compares to the signature. 2 Normative references The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 7816-4:2013, Identification cards — Integrated circuit cards — Part 4: Organization, security and commands for interchange ISO/IEC 7816-8:2004, Identification cards – Integrated circuit cards – Part 8: Commands for security operations ISO/IEC 7816-11:2004, Identification cards — Integrated circuit cards — Part 11: Personal verification through biometric methods ISO/IEC 7816-15, Identification cards — Integrated circuit cards — Part 15: Cryptographic information application ISO/IEC 9797-1:2011, Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher ISO 11568-2:2012, Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle ISO/IEC 14888-2:2008, Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms ISO/IEC 19794-2:2005, Information technology — Biometric data interchange formats — Part 2: Finger minutiae data ISO/IEC 15946-5, Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation, 2009-12-15 SIST EN 419212-2:2018
3 Terms and definitions For the purposes of this document, terms and definitions in EN 419212-1 apply. 4 Symbols and abbreviations For the purposes of this document, symbols and abbreviations in EN 419212-1 apply. 5 Signature application 5.1 Application Flow Figure 1 shows an execution flow for a signature creation as it is mandated in [1].
1 Available at https://www.bsi.bund.de/DE/Publikationen/TechnischeRichtlinien/tr03110/index_htm.html SIST EN 419212-2:2018
Figure 1 — Interaction sequences between SCA and QSCD in compliance with EU regulation The corresponding technical implementation is given in this document and as various mechanisms are specified for device authentication and user verification with a number of resulting combinations, Figure 2 gives some example execution flows for typical signature cards. Each card implements a signature application and they differ in the combination of privacy and security features. A card with a contact interface that is used in a trusted environment may not require any device authentication. In contrast, contactless cards are vulnerable to skimming and eavesdropping attacks and hence require protection. Reading SN.ICC would be a possible start for a non-privacy protecting device authentication (e.g. EN 419212-3, 3.9) whereas the card is addressed through contacts. For privacy protection (e.g. EN 419212-3, 3.6, EN 419212-3, 3.7) reading SN.ICC would not be desirable. Instead a password based mechanism may be involved which prevents the card being addressed unless a password, e.g. secret PIN or Card Access Number printed on the card is entered first. This is suitable for contactless cards which shall not allow communication without either the explicit act-of-will of the card holder or proof of legitimate physical possession of the card. In multi-application environments device authentication may be performed on card (e.g. MF level) prior to application selection. Whether for basic or additional services, a device authentication is always mandatory if the environment where the signature device is being used, is not known to be trustable. This is typical for public environment (e.g. airport, merchandise, POS). Only in trusted environments (e.g. company, campus) can device authentication be skipped. SIST EN 419212-2:2018
Figure 2 — Execute signature services Figure 2 shows the selection of additional services in the context of the ESIGN application. User verification might be required for some of the additional services. The detailed access conditions are described in the appropriate security environments. NOTE
* For contactless case in untrusted environment, two choices are possible. Either the reading of CIA file (refer to 14) and the selection of application are done before device authentication, in conformity with Figure 1, or the device authentication is done first.
PKCS#15 takes into account privacy preserving measures involving EF.DIR so that to meet data minimizing property requirements (new component enhanced CIODDO under EF.DIR ensures that the IFD can access DF.CIA content only once security protocols i.e. PACE are fulfilled). This prevent the leakage of user information from CIA file and preserve privacy. 5.2 Trusted environment versus untrusted environment According to the definitions in “trusted environment” (EN 419212-1, 3.58) and “untrusted environment” (EN 419212-1, 3.63), this specification describes additional mechanisms in order to accomplish the required security as claimed in the protection profile [3]. The additional mechanisms according to this specification are: - Device authentication SIST EN 419212-2:2018
to be secured by organisational means Untrusted Environment (public) to be secured by cryptographical means Contact communication channel has been established As in generic case no authentication protocol necessary (see 5 “Signature application”) Chip and Terminal Authentication, see device authentication protocols according to EN 419212-3, clause 3. Contactless communication channel has been established Password Based authentication (PACEv2) with provision of secure channel by secure Messaging (restricted to specific types of passwords e.g. biometric passwords or passwords stored as keys inside the ICC (see 8 “Password-based authentication protocols”) 1. Password based authentication (PACEv2) with provision of secure channel by Secure Messaging 2. Chip and Terminal authentication e.g. see privacy and /or mEAC device authentication protocol according to EN 419212-3, clause 3. NOTE The RSA transport protocol (EN 419212-3, clause 3.8) is not suitable, unless the SN.ICC is set to a “dummy value” for privacy reasons. 5.3 Selection of ESIGN application 5.3.1 General An ESIGN application is selected by its Application Identifier (AID) [see ISO/IEC 7816-5:2004]. The RID is registered by the ISO registration authority and has the following value: A0 00 00 01 67. The first 10 bytes of the AID have the following value AID = A0 00 00 01 67 || “ESIGN” = A0 00 00 01 67 45 53 49 47 4E with Category = 'A.' (international) PIX = 'ESIGN' = 5 bytes NOTE The maximum possible size of the PIX is 11 bytes (refer to ISO/IEC 7816-4, 12.2.3). The remaining 6 bytes may be used by CEN to distinguish between different implementations in the scope of this standard. SIST EN 419212-2:2018
...
기사 제목: EN 419212-2:2017 - 전자 신분증, 인증 및 신뢰 서비스용 안전 요소의 응용 인터페이스 - Part 2: 서명 및 인장 서비스 기사 내용: 이 부분에서는 SE가 이용되어 자격이 부여된 서명 생성 장치로 사용될 수 있는 메커니즘을 명시합니다. 이는 다음을 다룹니다: • 서명 생성 및 모바일 서명 생성 • 사용자 인증 • 암호 기반 인증 지정된 메커니즘은 EU 규정 910/2014에 따른 서비스와 같은 다른 목적에도 적합합니다. 이 규정은 2014년 7월 23일 유럽 의회와 이사회의 전자 신분증과 내부 시장의 전자 거래를 위한 신뢰할 수 있는 서비스에 관한 지침 1999/93/EC을 폐지합니다. 또한 인장의 특별한 경우도 명시됩니다. 인장과 서명의 차이점은 부록 B에서 설명됩니다. 부록 B에서는 SE를 자격이 부여된 인장 생성 장치로 사용하는 방법도 설명합니다. 모바일 서명은 안전 요소로 수행되는 전통적인 서명 방법의 대안입니다. 모바일 서명은 모바일 장치의 광범위한 보급과 eIDAS 규정에 의한 자격 부여로 인해 장려됩니다. 원격 서명(또는 서버 서명)의 특수한 경우도 부록 C에서 이 사양서에 포함되어 있습니다. 부록 B를 제외한 이 문서의 나머지 부분에서 인장에 대한 특별한 개념은 없습니다. 이는 기술적으로 서명과 비교됩니다.
The article discusses the specifications for Secure Elements (SEs) to be used as qualified signature creation devices. It covers signature creation, mobile signature creation, user verification, and password-based authentication. These mechanisms are suitable for services related to electronic identification and trust services for electronic transactions. The article also explains the differences between seal and signature and how the mechanisms for SEs as qualified signature creation devices can be used for SEs as qualified seal creation devices. It mentions the use of mobile signature as an alternative to classical signature and covers the case of remote signature. The article concludes by stating that, except for Annex B, the document does not specifically address the notion of a seal since it is technically similar to a signature.
The article discusses the specifications outlined in EN 419212-2:2017, which focuses on the application interface for secure elements (SEs) used in electronic identification, authentication, and trusted services. This part specifically covers mechanisms for SEs to be used as qualified signature creation devices, including signature creation and mobile signature creation, user verification, and password-based authentication. The specified mechanisms can also be applied to services related to electronic identification and trust services in the context of EU Regulation 910/2014. The article also mentions that the specification covers the use of SEs as qualified seal creation devices, explaining the differences between seals and signatures. Additionally, it discusses the use of mobile signatures as an alternative to the traditional signature method, particularly suitable for mobile devices. The specification also covers the case of remote signatures or server signing. It concludes by stating that, other than in Annex B, the document does not differentiate between seals and signatures.
記事のタイトル:EN 419212-2:2017 - 電子識別、認証、および信頼されたサービスのためのセキュアエレメントのアプリケーションインタフェース-パート2:署名とシールサービス 記事の内容:この部分では、セキュアエレメント(SE)を資格のある署名作成デバイスとして使用するためのメカニズムを指定しています。以下をカバーしています: ・署名作成とモバイル署名作成 ・ユーザーの確認 ・パスワードベースの認証 指定されたメカニズムは、内部市場における電子識別および信頼された電子取引のためのEU規則910/2014の文脈でのサービスなど、他の目的にも適しています。また、シールの特殊なケースも仕様書でカバーされています。シールと署名の違いは付録Bで説明されています。付録Bでは、セキュアエレメントを資格のあるシール作成デバイスとして使用する方法も説明されています。 モバイル署名は、セキュアエレメントによって行われる従来の署名の代替手段です。モバイル署名は、モバイルデバイスの広範な普及とeIDAS規則による認定によって推奨されています。この仕様では、リモート署名(またはサーバー署名)の特殊なケースも付録Cでカバーされています。 付録Bを除き、このドキュメントの残りの部分では、技術的には署名と同様のため、シールの特定の概念はありません。
記事のタイトル:EN 419212-2:2017 - 電子識別、認証、および信頼されたサービスのためのセキュアエレメントのアプリケーションインターフェース- Part 2: 署名と封印のサービス 記事の内容:このパートでは、セキュアエレメント(SE)を資格付けされた署名作成デバイスとして利用するためのメカニズムについて規定しています。具体的には、署名の作成とモバイル署名の作成、ユーザーの認証、パスワードベースの認証をカバーしています。規定されたメカニズムは、EU規制910/2014の文脈での電子識別および信頼されたサービスに関連する目的にも適しています。この規制は、2014年7月23日に欧州議会と理事会によって採択され、電子取引を含む内部市場の電子識別および信頼されたサービスに関する指令1999/93/ECを廃止しました。 また、封印の特定のケースも仕様書で取り上げられています。封印と署名の違いは、付属書Bで説明されています。付属書Bでは、SEを資格付けされた封印作成デバイスとして利用する方法も説明しています。 モバイル署名は、セキュアエレメントを使用せずに行われる伝統的な署名方法の代替手段です。モバイル署名は、モバイルデバイスの広範な普及とeIDAS規制による認定の推進を受けています。この仕様書では、リモート署名(またはサーバー署名)の特定のケースも付属書Cで取り扱われています。 付属書B以外の文書の残りの部分では、技術的には署名と同じであるため、封印に特別な概念はありません。
기사 제목: EN 419212-2:2017 - 전자 신원, 인증 및 신뢰 서비스용 보안 요소에 대한 응용 인터페이스 - 제 2 부: 서명 및 인장 서비스 기사 내용: 이 부분은 보안 요소(SEs)를 자격이 부여된 서명 생성 장치로 사용하기 위한 메커니즘을 명시합니다. 다음을 다룹니다: • 서명 생성 및 이동 서명 생성 • 사용자 확인 • 암호 기반 인증 지정된 메커니즘은 EU 규정 910/2014에도 적합하며, 이 규정은 유럽 의회 및 이사회에 의해 2014년 7월 23일에 전자 신원 및 전자 거래를 위한 신뢰 서비스에 대한 EU규칙 1999/93/EU을 폐지하는 내부 시장에서의 전자 신원 및 신뢰 서비스에 대한 규칙입니다. 인장에 대한 특수한 사례도 사양서에서 다룹니다. 인장과 서명의 차이점은 부록 B에서 설명됩니다. 부록 B에서는 보안 요소를 자격이 부여된 인장 생성 장치로 사용하는 방법도 설명합니다. 모바일 서명은 보안 요소에 의해 수행되는 고전적인 서명 사례의 대체 수단입니다. 모바일 서명은 모바일 장치의 광범위한 보급 및 eIDAS 규정에 의해 허가된 자격에 의해 장려됩니다. 본 명세서에는 원격 서명(또는 서버 서명)의 특수한 사례도 부록 C에서 다룹니다. 부록 B를 제외한 이 문서의 나머지 부분에서는 인장에 대한 특별한 개념이 없으며, 기술적으로 서명과 유사합니다.










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...