EP3311351A1 - Method for certifying electronic documents and contents on the internet and certification system of electronic documents and contents that implements said method - Google Patents
Method for certifying electronic documents and contents on the internet and certification system of electronic documents and contents that implements said methodInfo
- Publication number
- EP3311351A1 EP3311351A1 EP16734751.7A EP16734751A EP3311351A1 EP 3311351 A1 EP3311351 A1 EP 3311351A1 EP 16734751 A EP16734751 A EP 16734751A EP 3311351 A1 EP3311351 A1 EP 3311351A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- surfing
- contents
- electronic documents
- user
- internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 230000005540 biological transmission Effects 0.000 claims abstract description 8
- 238000012545 processing Methods 0.000 claims description 4
- 230000000875 corresponding effect Effects 0.000 description 8
- 230000004048 modification Effects 0.000 description 8
- 238000012986 modification Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 239000000243 solution Substances 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000006735 deficit Effects 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 238000009472 formulation Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005352 clarification Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000009931 harmful effect Effects 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Definitions
- the present invention concerns a method for certifying electronic documents and contents.
- the present invention concerns a method for certifying electronic documents and contents in a protected environment on the Internet and a system for carrying out said certification which implements said method.
- the present invention is able not only to certify documents, generated or downloaded on the Internet, but also to save, date and certify Internet surfing, hence procedures, passes, search logics and connections, in such a way as to be exempt from counterfeiting, guaranteeing the authenticity and the possibility of certifying a posteriori the authenticity and date thereof, also if the original element is later no longer accessible.
- the date and time of acquisition of the screenshot can be left unchanged, but the content of the electronic document itself can be modified, for example with a retouching software program, for example cancelling a Company reference or an important connection, or cancelling a field of text, or modifying the URL address of the Internet site, rewriting it and/or camouflaging it.
- a retouching software program for example cancelling a Company reference or an important connection, or cancelling a field of text, or modifying the URL address of the Internet site, rewriting it and/or camouflaging it.
- US 6,839,879 Bl describes a method and the corresponding system for certifying electronic documents, which provides to temporally mark and manage electronic documents.
- GB 2357350 A describes a system for certifying electronic documents, more specifically electronic copies of real documents.
- this document provides to acquire real documents, for example by scanning them, or with other acquisition methods, to create an electronic copy of the documents to be certified.
- the document refers to the use of the Internet only to be able to associate the electronic device, with which an electronic document has been certified, with an archive system that is used to store all the electronic documents certified, and to be able to access the same.
- WO 02/077793 Al describes a method to organize contents generated by a computer, in particular to catalog them. The method described there provides to associate electronic contents with predefined parameters to supply a certification of the parameters associated with each electronic content acquired from web pages.
- US 2002/0124172 Al describes a method to validate web pages.
- the method provides to digitally sign electronic contents of a web page accessible by using a portal on the Internet, but changing the information content of the electronic contents signed because components need to be installed in the servers that host the web page to be signed.
- the solutions described above do not ensure a certification method that can be, for example, exempt from malware present on the surfing Client, from problems inserted between the Client and Internet, or from malevolent and fraudulent interventions by the user himself.
- the purpose of the present invention is therefore to perfect a method for certifying electronic documents and contents in a protected environment on the Internet, and a system to certify electronic documents and contents that implements said method, which are able to guarantee the authenticity and non- changeability of the electronic documents acquired, and which are able to frustrate any possible attempt to alter information and/or parameters of the electronic documents and contents acquired on the Internet.
- the Applicant has devised, tested and embodied the present invention to overcome the shortcomings of the state of the art and to obtain these and other purposes and advantages.
- Embodiments described here concern a method for certifying electronic documents and contents, which allows a user to surf the Internet in a protected environment to acquire and save said electronic documents and contents to be certified.
- the method comprises at least an acquisition step, a memorization step and a transmission step.
- the acquisition step comprises the following steps in succession:
- the surfing step provides to acquire and save an entire web surf of the user, therefore in terms of content intended as research strategies, connections, logics, passages and other, and also in terms of documents downloaded or generated.
- the memorization step comprises the following steps in succession:
- the content and document generation step provides at least a procedure in which the electronic documents and contents acquired are signed temporally without changing the information content of the electronic documents and contents themselves, therefore comprising the web pages visited and/or the web surfing performed by the user.
- - fig. 1 is a flow chart of certification steps of an electronic document, in accordance with the present invention.
- - fig. 2 is a schematic view of a certification system of a document, in accordance with the present invention.
- fig. 1 shows with a flow chart a method 10 for certifying documents, in particular documents in electronic format acquired from the Internet, and also electronic contents according to one embodiment of the present invention.
- the method 10 can be implemented using a system 100 for certifying electronic documents acquired on the Internet, or more generally electronic contents, for example a whole surfing on web pages, shown in its entirety by the general diagram in fig. 2.
- certification we mean, in general, the process by which documents or contents can be deemed unchanged from the moment when they were acquired.
- the certification of a document guarantees the persistence, consistency, validity, integrity and authenticity of spatial-temporal data, information, parameters and the source of acquisition of the electronic document itself.
- the invention can also refer to the information content of a particular electronic document or electronic content.
- the method 10 can comprise a step 12 of acquiring the electronic document or content.
- a user can acquire an electronic document or content to be certified.
- the user can for example surf the Internet in a protected environment to download one or more electronic documents or contents to be subsequently certified.
- the user can surf the Internet using a secure and controlled Internet connection.
- the user can surf the Internet in a computer portal for certifying documents or contents.
- the method 10 can comprise a step 14 of memorizing the electronic document or content acquired on the Internet, after the acquisition step 12.
- the memorization step 14 it is provided to memorize the one or more electronic documents or contents to be certified acquired on the Internet by the user, and the corresponding environmental parameters detected and measured by the system.
- the method 10 can comprise a transmission step 16, after the memorization step 14.
- a further memorization is provided of the one or more electronic documents or contents certified, in an archive support, such as for example a CD, DVD, USB support etc., which on request can be transmitted to the user who acquired the electronic documents or contents.
- an archive support such as for example a CD, DVD, USB support etc.
- the acquisition step 12 can comprise, in succession, a credit management step 18, a step 20 to start the protected environment, a step 22 to start a timer and counter, a web surfing step 24 and a step to choose the acquisition mode 26.
- the user can manage his credit to carry out one or more operations made available by the software program of the protected environment, such as for example concluding one or more certifications of electronic documents or contents and/or receiving the archive support with, inside it, the certified electronic documents.
- an initialization of the protected environment is provided, inside which the user can safely surf the net to acquire electronic documents or contents to be certified.
- the user can log in to the system 100, inserting a user name and a password.
- it can be provided to insert personal data such as one's tax code and or other personal data that guarantee the user's authenticity, for example using strong authentication systems.
- the step 22 to start a timer and counter provides to start a timer device and a counter device, configured respectively to generate and memorize the user's web surfing time and to detect the quantity of information downloaded during the user's web surfing, for example the quantity of Bytes used during the active surfing session.
- a timer device advantageously allows to monitor the user's surfing session both constantly and accurately, increasing the reliability of the acquisitions and consequently the certifications made, both in terms of the documents generated, viewed or uploaded/downloaded, and also more generally in terms of contents, such as the surfing mode, the search logics or other.
- the user can surf the Internet inside the protected environment, for example searching for the contents from which to acquire the one or more electronic documents or contents to be certified.
- the user can select one or more acquisition modes of the electronic documents or contents to be certified.
- the user can acquire a single web page, for example making a screenshot of the screen displayed.
- he/she can acquire a whole website, or a specific image or video, or data from specific environments, for example from social networks.
- the web surfing step 24 provides to acquire and save the user's whole web surfing.
- the user can activate specific plug- ins supported by the computer portal, able to acquire specific web contents.
- the memorization step 14 can comprise an archiving step 28 and a subsequent document generation step 30.
- the electronic documents or contents acquired are archived in at least a network archive system 190 associated with the certification system 100.
- the electronic documents or contents are validated and encoded to guarantee their security against any possible attempt to modify them, either external (by third parties) or internal (by the user who acquired electronic documents during the protected surfing or by the system administrators), after acquisition.
- the one or more network archive systems 190 can execute, substantially constantly, one or more backup copies, geographically distributed, of the chronology of the surfing session, the acquisition, the data input by the user, etc., so as to guarantee a further security to the system 100, to the state of the acquisition environment and surroundings, against any attempt at modification.
- the document generation step 30 provides to temporally sign the electronic documents or contents acquired on the Internet, in particular to certify the exact date and time they were acquired and to guarantee they cannot be changed.
- the temporal signature of the electronic documents or contents acquired does not modify the information content of the electronic documents or contents themselves and/or the web pages and/or the user's entire surfing session.
- the document generation step 30 provides to generate an information report, containing information as complete as possible on the user's whole surfing session.
- the information report can contain the data acquired and the corresponding references to guarantee the substance and non-changeability thereof.
- the method 10 can comprise a further credit management step 18 which allows the user to verify if there is sufficient credit for the possible subsequent step 16 of transmitting the information report and the one or more electronic documents acquired, certified, archived in one or more of the archive backups cited above.
- the user can connect to the protected environment to carry out a trial surfing session, for example free.
- the trial session can be limited in the functions available, compared with the complete session which is generally available in return for payment, and can be active for a limited time and/or for a limited number of trials.
- fig. 2 shows a system 100 for certifying electronic documents or contents that can implement the method 10 described above.
- the system 100 can be connected to a fruition unit 110 of the electronic documents to be certified.
- the fruition unit 1 10 is a device owned and/or used by the user that allows to connect to the system 100 for certifying electronic documents or contents.
- the fruition unit 110 can be for example an electronic processor, such as for example a computer, notebook, netbook or a mobile electronic device, such as for example a smartphone, tablet or any other device that allows the user to surf the Net simply and securely and to access the computer portal for certifying electronic documents or contents.
- an electronic processor such as for example a computer, notebook, netbook or a mobile electronic device, such as for example a smartphone, tablet or any other device that allows the user to surf the Net simply and securely and to access the computer portal for certifying electronic documents or contents.
- the system 100 can comprise a surfing and acquisition interface 180 of the electronic documents or contents to be certified.
- the surfing and acquisition interface 180 is accessible through the fruition unit 1 10 when the latter is correctly connected to the system 100.
- the fruition unit 1 10 can comprise a graphical interface 120, configured to display the surfing and acquisition interface 180 and hence the screenshots of the various Internet sites to the connected user, through an encoded web connection.
- the graphical interface 120 can be a touch screen that allows the user to select functions and insert input without needing to use a keyboard and/or a mouse.
- Fig. 2 shows by way of example the screen of an internet site displayed on a fruition unit 110.
- the graphical interface 120 in this situation, can comprise an URL address 130, a date reference 135, a time reference 140, a title reference 145, an image 150, an image description 155 and a hypertext link 160.
- the URL address 130 can show, preferably alphanumerically, the address of the internet site in which the user is surfing at a specific moment.
- the date reference 135 and the time reference 140 are indicators that show respectively the actual surfing date and the actual surfing time.
- the surfing date and time in the protected environment can be constantly compared with external systems, having an hourly reference which, in a preferred solution, can be monitored by other external systems.
- the external system can surf sites with pages that have a date stamp, to constantly compare the date.
- This aspect is particularly advantageous because it makes it substantially impossible to modify the date and time with the intention of falsifying the acquisition moment and hence the certification of electronic documents or contents acquired on the Internet.
- the title reference 145 is a field of text that synthetically describes the content of the Internet site.
- the one or more images 150 can be, for example, photos of objects, reference drawings, graphics etc., present inside the Internet site.
- the image description 155 is generally a text that is inserted in correspondence with the image 150 to give a substantive description thereof.
- the one or more hypertext links 160 can be links to other Internet pages, in particular they can be links that, if selected, direct the user to one or more new Internet pages.
- the graphical interface 120 can also comprise other fields of text 165, which can for example contain an article, a description, a space inside which it is possible to insert notes, comments, reviews or other.
- the graphical interface 120 can also comprise one or more plugins for access to functions relating to social networks for example.
- the surfing and acquisition interface 180 can be associated with a surfing system 191, for example a router, with network archive systems 190, for example servers, and with processing systems 192, also servers for example.
- a surfing system 191 for example a router
- network archive systems 190 for example servers
- processing systems 192 also servers for example.
- the user's fruition unit 1 10 can be connected by Internet and a web browser to the system 100.
- the fruition unit 110 can be connected, for example in wireless mode, and in any case by an Internet network, to the surfing and acquisition interface 180.
- the system 100 can be configured, by means of the surfing and acquisition interface 180, to supply to the fruition unit 110 a protected surfing environment, which allows the user only to surf the net to search for contents to be acquired and certified.
- the network archive systems 190 and the processing systems 192 can be interfaced, in protected and indirect mode, and only by means of the surfing and acquisition interface 180, to the fruition unit 1 10 and can be configured to process and archive securely the various electronic data from the user's surfing.
- the method 10 provides to read in advance any possible attempt to modify one or more of the elements cited above and the corresponding communication methods, in order to block said possible attempt, preventing any modification and the falsification of the certification of the one or more electronic documents acquired by the user.
- a user may possibly try to modify the URL address 130 of the Internet site inside which he is surfing, and try to modify the actual address with a different one.
- DNS injection a procedure called "DNS injection” which consists of intervening in resolving the names, that is, when a domain name is converted into an IP address in order to take the web surfing to another destination transparently.
- the invention provides that DNS lookups for resolving domain names are carried out on an internal search engine and compared with lookups carried out at the same time on other external DNS engines.
- a user may also possibly try to re-direct the surfing onto websites that have been falsified by modifications of the routing systems, and in particular by modifying the connection between the router and the fruition unit 110, and/or between the surfing and acquisition interface 180 and fruition unit 110, for example by modifying the transmission protocols of the router/routers.
- the data packages transmitted by the router/routers are traced and acquired in a non-modifiable format at the same time as the user is surfing.
- a user may try to modify contents inside the Internet site by using malware programs present for example in the fruition unit 110 or in the external network archive system 190.
- surfing systems 191 are not directly accessible by users, and therefore the possibilities of action and consequent impairment are limited.
- the data are acquired through two or more different access channels to the Internet, used simultaneously or randomly, so as to be able to compare the contents downloaded in parallel and to identify possible attempts to alter them and/or make the surfing channel used not predictable.
- the paths and times of travel of the data packages used are continuously monitored, so as to identify possible anomalies in them.
- network archive systems 190 are protected by evolved firewall systems and by systems 193 to monitor intrusions. Every attempted access is logged on remote devices. In particular, if an attempted access is not authorized, the monitoring systems 193 sound an alarm.
- the data are also encoded, by means of an encoding system 194, so as to make it substantially impossible to modify them without breaking the code.
- the main files of the operating system are analyzed cyclically by part of an integrity control system 195. This can be configured to sound alarms if compromises are identified.
- Both the data archives and the attached reports are signed digitally and marked temporally. It is therefore not possible to modify the contents and/or the properties without this harmful activity being detected, thus causing the archive itself to lose its validity.
- the information report generated during the document generation step 30 includes the list of materials of the archive, with the corresponding hash signatures. Moreover, the hash of the whole archive is included, so as to make any impairment difficult.
- the information report is digitally signed so as to prevent any modification thereof by a third party.
- the whole fruition activity of the fruition unit 110 is registered, certified and attached to the data archive, available to the user.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ITUB20151433 | 2015-06-17 | ||
PCT/IB2016/053585 WO2016203426A1 (en) | 2015-06-17 | 2016-06-16 | Method for certifying electronic documents and contents on the internet and certification system of electronic documents and contents that implements said method |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3311351A1 true EP3311351A1 (en) | 2018-04-25 |
Family
ID=55409921
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16734751.7A Ceased EP3311351A1 (en) | 2015-06-17 | 2016-06-16 | Method for certifying electronic documents and contents on the internet and certification system of electronic documents and contents that implements said method |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP3311351A1 (en) |
WO (1) | WO2016203426A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1108308A1 (en) * | 1998-08-28 | 2001-06-20 | Sap Ag | System and method for controlling the operational sequence in network applications |
US20030132957A1 (en) * | 2002-01-15 | 2003-07-17 | International Business Machines Corporation | System for recording world wide web browsing sessions navigation on a real-time basis and for subsequently displaying the recorded sessions as surrogate browsing sessions with user enabled real-time modification |
US20110231931A1 (en) * | 2008-12-01 | 2011-09-22 | Chengdu Huawei Symantec Technologies Co., Ltd. | Method and device for preventing domain name system spoofing |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6839879B1 (en) * | 1999-05-07 | 2005-01-04 | Xilinx, Inc. | Method and system for time-stamping and managing electronic documents |
GB2357350A (en) * | 1999-12-18 | 2001-06-20 | Ncr Int Inc | Storage and retrieval of images |
US20020124172A1 (en) * | 2001-03-05 | 2002-09-05 | Brian Manahan | Method and apparatus for signing and validating web pages |
WO2002077793A1 (en) * | 2001-03-26 | 2002-10-03 | Geo Trust, Inc. | Defining content zones |
ITRM20080034A1 (en) * | 2008-01-23 | 2009-07-24 | Luca Stefano De | SPACE-TEMPORAL MARKING DEVICE, IN PARTICULAR OF DIGITAL DOCUMENTS. |
-
2016
- 2016-06-16 EP EP16734751.7A patent/EP3311351A1/en not_active Ceased
- 2016-06-16 WO PCT/IB2016/053585 patent/WO2016203426A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1108308A1 (en) * | 1998-08-28 | 2001-06-20 | Sap Ag | System and method for controlling the operational sequence in network applications |
US20030132957A1 (en) * | 2002-01-15 | 2003-07-17 | International Business Machines Corporation | System for recording world wide web browsing sessions navigation on a real-time basis and for subsequently displaying the recorded sessions as surrogate browsing sessions with user enabled real-time modification |
US20110231931A1 (en) * | 2008-12-01 | 2011-09-22 | Chengdu Huawei Symantec Technologies Co., Ltd. | Method and device for preventing domain name system spoofing |
Non-Patent Citations (1)
Title |
---|
See also references of WO2016203426A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2016203426A1 (en) | 2016-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107209830B (en) | Method for identifying and resisting network attack | |
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
US8286225B2 (en) | Method and apparatus for detecting cyber threats | |
CN102546576B (en) | A kind of web page horse hanging detects and means of defence, system and respective code extracting method | |
Ristic | Apache security | |
Likaj et al. | Where we stand (or fall): An analysis of CSRF defenses in web frameworks | |
Castiglione et al. | Security and privacy issues in the Portable Document Format | |
CN111786795B (en) | Domain name registration method, domain name supervision method, client and domain name supervision terminal | |
US20180302437A1 (en) | Methods of identifying and counteracting internet attacks | |
Calzavara et al. | Testing for integrity flaws in web sessions | |
Heiderich et al. | The bug that made me president a browser-and web-security case study on helios voting | |
Thompson et al. | The software vulnerability guide | |
Kimak et al. | An investigation into possible attacks on HTML5 indexedDB and their prevention | |
Batarfi et al. | Csrfdtool: Automated detection and prevention of a reflected cross-site request forgery | |
EP3311351A1 (en) | Method for certifying electronic documents and contents on the internet and certification system of electronic documents and contents that implements said method | |
Riesch et al. | Audit based privacy preservation for the OpenID authentication protocol | |
Sharma et al. | A Security Analysis of Password Managers on Android | |
Appelbaum | Technical analysis of the Ultrasurf proxying software | |
Haddon | Attack Vectors and the Challenge of Preventing Data Theft | |
Salvador et al. | wraudit: a tool to transparently monitor web resources’ integrity | |
Georgiev | Information Security of PHP Applications | |
Bernardo | Targeted attack detection by means of free and open source solutions | |
Klooster | Applying a Security Testing Methodology: a Case Study | |
Kumar | Penetration Testing Building Blocks | |
Balasundram et al. | Prevention of SQL Injection attacks by using service oriented authentication technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20180116 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200224 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20221017 |