In the mobile scenario, you simply ship the PDF up to the server where all the work takes place - no problem.
Leonard On 9/14/12 4:54 AM, "Alvaro Cuno" <[email protected]> wrote: >It seems an excessive setting but, for example, if Computer1 is a >mobile device, Computer2 is a server and Computer3 is a smartcard we >are in a real scenario. > >On 13 September 2012 01:10, Leonard Rosenthol <[email protected]> wrote: >> Why would you ever want a scenario with three computers to do something >>as >> simple as signing a file? This just seems like extreme overkill for no >> practical reason. >> >> As discussed, you will either need to cache the "prepared for signing" >> file or modify the iText sources. >> >> Leonard >> >> On 9/13/12 5:42 AM, "Alvaro Cuno" <[email protected]> wrote: >> >>>Sorry, I was too brief ... let me explain more in detail my use case: >>> >>>Computer1 Computer2 Computer3 >>> o----getMetahash(pdf, params)--->o >>> o<---------------metahash---------------o >>> o-------------------------------cipher(metahash)------------->o >>> o<----------------------------------signature----------------------o >>> o-------signDoc(pdf, signature)---->o >>> o<-----signedPdf-------------------------o >>> >>>Notice that the only one needs to know about pdf processing is >>>Computer2, and because it can't store any intermediate results >>>Computer2 need to generate the same pdf structure twice. I think the >>>setting before is a deferred signing because the multiple steps. >>> >>>However, if the placement of objects is random then I will have to >>>redesign the previous scenario. >>> >>>Thanks for the advice >>> >>>- >>>Alvaro >>> >>>On 12 September 2012 00:37, Leonard Rosenthol <[email protected]> >>>wrote: >>>> Deferred signing doesn't care about the order of the objects…. >>>> >>>> People have been implementing such for over a decade w/o any >>>>problems…. >>>> >>>> Leonard >>>> >>>> On 9/12/12 6:00 AM, "Alvaro Cuno" <[email protected]> wrote: >>>> >>>>>Hello, a useful example is on deferred signing ... >>>>> >>>>>Alvaro >>>>> >>>>>On 11 September 2012 02:00, Leonard Rosenthol <[email protected]> >>>>>wrote: >>>>>> Neither iText nor any other PDF producer has such an option, because >>>>>>it >>>>>> serves no useful purpose. >>>>>> >>>>>> I still don't understand why it matters since the PDF is valid and >>>>>> processes correctly. >>>>>> >>>>>> Leonard >>>>>> >>>>>> On 9/11/12 5:30 AM, "Alvaro Cuno" <[email protected]> wrote: >>>>>> >>>>>>>Ok, if not is a pdf standard requirement, how can I set the fixed >>>>>>>form >>>>>>>instead of the free form? that is it possible? ... I noticed the >>>>>>>fact >>>>>>>because I was experimenting implement digital signatures using >>>>>>>multiple machines so I can use only local variables. >>>>>>> >>>>>>>Greats >>>>>>>- >>>>>>>Alvaro >>>>>>> >>>>>>> >>>>>>>On 10 September 2012 01:58, Leonard Rosenthol <[email protected]> >>>>>>>wrote: >>>>>>>> Because object numbering and their location in a PDF are >>>>>>>>completely >>>>>>>>free >>>>>>>> form there are no requirements. >>>>>>>> >>>>>>>> Why does it matter? >>>>>>>> >>>>>>>> From: Alvaro Cuno <[email protected]> >>>>>>>> Reply-To: Post here <[email protected]> >>>>>>>> To: Post here <[email protected]> >>>>>>>> Subject: [iText-questions] are the dictionary elements randomly >>>>>>>>placed? >>>>>>>> >>>>>>>> >>>>>>>> Hello all, >>>>>>>> >>>>>>>> I signed a same file (hello.pdf) three times using the next code: >>>>>>>> >>>>>>>> public static void sign(String src, String dest) >>>>>>>> throws IOException, DocumentException, >>>>>>>>KeyStoreException, >>>>>>>> NoSuchAlgorithmException, CertificateException, >>>>>>>> UnrecoverableKeyException { >>>>>>>> >>>>>>>> Security.addProvider(new BouncyCastleProvider()); >>>>>>>> KeyStore ks = KeyStore.getInstance("pkcs12"); >>>>>>>> ks.load(new FileInputStream("citizen1.p12"), >>>>>>>> "password".toCharArray()); >>>>>>>> String alias = (String) ks.aliases().nextElement(); >>>>>>>> PrivateKey key = (PrivateKey) ks.getKey(alias, >>>>>>>> "password".toCharArray()); >>>>>>>> Certificate[] chain = ks.getCertificateChain(alias); >>>>>>>> >>>>>>>> PdfReader reader = new PdfReader(src); >>>>>>>> FileOutputStream os = new FileOutputStream(dest); >>>>>>>> PdfStamper stamper = PdfStamper.createSignature(reader, >>>>>>>>os, >>>>>>>>'\0', >>>>>>>> null, true); >>>>>>>> PdfSignatureAppearance appearance = >>>>>>>> stamper.getSignatureAppearance(); >>>>>>>> appearance.setAcro6Layers(true); >>>>>>>> appearance.setCrypto(key, chain, null, >>>>>>>> PdfSignatureAppearance.WINCER_SIGNED); >>>>>>>> appearance.setVisibleSignature(new Rectangle(160, 732, >>>>>>>>232, >>>>>>>>780), 1, >>>>>>>> null); >>>>>>>> Calendar cal = Calendar.getInstance(); >>>>>>>> cal.setTime(new Date(0)); >>>>>>>> appearance.setSignDate(cal); >>>>>>>> stamper.close(); >>>>>>>> } >>>>>>>> >>>>>>>> Everything is ok and all digital signatures are valid, however I >>>>>>>>don't >>>>>>>> understand why the internal structures of the signed documents >>>>>>>>(see >>>>>>>>attached >>>>>>>> files) are different? >>>>>>>> >>>>>>>> >>>>>>>> hello-signed-1.pdf hello-signed-2.pdf >>>>>>>>hello-signed-3.pdf >>>>>>>> ... ... >>>>>>>>... >>>>>>>> %%EOF %%EOF %%EOF >>>>>>>> ... ... >>>>>>>>... >>>>>>>> 10 0 obj 10 0 obj 10 0 >>>>>>>>obj >>>>>>>> 11 0 obj 8 0 obj 11 0 >>>>>>>>obj >>>>>>>> 12 0 obj 11 0 obj 12 0 >>>>>>>>obj >>>>>>>> 8 0 obj 9 0 obj 9 >>>>>>>>0 >>>>>>>>obj >>>>>>>> 9 0 obj 12 0 obj 8 0 >>>>>>>>obj >>>>>>>> 5 0 obj 5 0 obj 5 >>>>>>>>0 >>>>>>>>obj >>>>>>>> ... ... >>>>>>>>... >>>>>>>> >>>>>>>> >>>>>>>> The objects 8, 9 and 11 are related to /n0, /n2, /FRM fields, ... >>>>>>>>these >>>>>>>> were inserted randomly? if yes, why? >>>>>>>> >>>>>>>> - >>>>>>>> Alvaro >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>------------------------------------------------------------------- >>>>>>>>-- >>>>>>>>-- >>>>>>>>-- >>>>>>>>----- >>>>>>>> Live Security Virtual Conference >>>>>>>> Exclusive live event will cover all the ways today's security and >>>>>>>> threat landscape has changed and how IT managers can respond. >>>>>>>>Discussions >>>>>>>> will include endpoint security, mobile security and the latest in >>>>>>>>malware >>>>>>>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>>>>>>> _______________________________________________ >>>>>>>> iText-questions mailing list >>>>>>>> [email protected] >>>>>>>> https://lists.sourceforge.net/lists/listinfo/itext-questions >>>>>>>> >>>>>>>> iText(R) is a registered trademark of 1T3XT BVBA. >>>>>>>> Many questions posted to this list can (and will) be answered >>>>>>>>with a >>>>>>>> reference to the iText book: http://www.itextpdf.com/book/ >>>>>>>> Please check the keywords list before you ask for examples: >>>>>>>> http://itextpdf.com/themes/keywords.php >>>>>>> >>>>>>>-------------------------------------------------------------------- >>>>>>>-- >>>>>>>-- >>>>>>>-- >>>>>>>---- >>>>>>>Live Security Virtual Conference >>>>>>>Exclusive live event will cover all the ways today's security and >>>>>>>threat landscape has changed and how IT managers can respond. >>>>>>>Discussions >>>>>>>will include endpoint security, mobile security and the latest in >>>>>>>malware >>>>>>>threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>>>>>>_______________________________________________ >>>>>>>iText-questions mailing list >>>>>>>[email protected] >>>>>>>https://lists.sourceforge.net/lists/listinfo/itext-questions >>>>>>> >>>>>>>iText(R) is a registered trademark of 1T3XT BVBA. >>>>>>>Many questions posted to this list can (and will) be answered with a >>>>>>>reference to the iText book: http://www.itextpdf.com/book/ >>>>>>>Please check the keywords list before you ask for examples: >>>>>>>http://itextpdf.com/themes/keywords.php >>>>>> >>>>>> >>>>>> >>>>>>--------------------------------------------------------------------- >>>>>>-- >>>>>>-- >>>>>>----- >>>>>> Live Security Virtual Conference >>>>>> Exclusive live event will cover all the ways today's security and >>>>>> threat landscape has changed and how IT managers can respond. >>>>>>Discussions >>>>>> will include endpoint security, mobile security and the latest in >>>>>>malware >>>>>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>>>>> _______________________________________________ >>>>>> iText-questions mailing list >>>>>> [email protected] >>>>>> https://lists.sourceforge.net/lists/listinfo/itext-questions >>>>>> >>>>>> iText(R) is a registered trademark of 1T3XT BVBA. >>>>>> Many questions posted to this list can (and will) be answered with a >>>>>>reference to the iText book: http://www.itextpdf.com/book/ >>>>>> Please check the keywords list before you ask for examples: >>>>>>http://itextpdf.com/themes/keywords.php >>>>> >>>>>---------------------------------------------------------------------- >>>>>-- >>>>>-- >>>>>---- >>>>>Live Security Virtual Conference >>>>>Exclusive live event will cover all the ways today's security and >>>>>threat landscape has changed and how IT managers can respond. >>>>>Discussions >>>>>will include endpoint security, mobile security and the latest in >>>>>malware >>>>>threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>>>>_______________________________________________ >>>>>iText-questions mailing list >>>>>[email protected] >>>>>https://lists.sourceforge.net/lists/listinfo/itext-questions >>>>> >>>>>iText(R) is a registered trademark of 1T3XT BVBA. >>>>>Many questions posted to this list can (and will) be answered with a >>>>>reference to the iText book: http://www.itextpdf.com/book/ >>>>>Please check the keywords list before you ask for examples: >>>>>http://itextpdf.com/themes/keywords.php >>>> >>>> >>>>----------------------------------------------------------------------- >>>>-- >>>>----- >>>> Live Security Virtual Conference >>>> Exclusive live event will cover all the ways today's security and >>>> threat landscape has changed and how IT managers can respond. >>>>Discussions >>>> will include endpoint security, mobile security and the latest in >>>>malware >>>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>>> _______________________________________________ >>>> iText-questions mailing list >>>> [email protected] >>>> https://lists.sourceforge.net/lists/listinfo/itext-questions >>>> >>>> iText(R) is a registered trademark of 1T3XT BVBA. >>>> Many questions posted to this list can (and will) be answered with a >>>>reference to the iText book: http://www.itextpdf.com/book/ >>>> Please check the keywords list before you ask for examples: >>>>http://itextpdf.com/themes/keywords.php >>> >>>------------------------------------------------------------------------ >>>-- >>>---- >>>Live Security Virtual Conference >>>Exclusive live event will cover all the ways today's security and >>>threat landscape has changed and how IT managers can respond. >>>Discussions >>>will include endpoint security, mobile security and the latest in >>>malware >>>threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >>>_______________________________________________ >>>iText-questions mailing list >>>[email protected] >>>https://lists.sourceforge.net/lists/listinfo/itext-questions >>> >>>iText(R) is a registered trademark of 1T3XT BVBA. >>>Many questions posted to this list can (and will) be answered with a >>>reference to the iText book: http://www.itextpdf.com/book/ >>>Please check the keywords list before you ask for examples: >>>http://itextpdf.com/themes/keywords.php >> >> >>------------------------------------------------------------------------- >>----- >> Live Security Virtual Conference >> Exclusive live event will cover all the ways today's security and >> threat landscape has changed and how IT managers can respond. >>Discussions >> will include endpoint security, mobile security and the latest in >>malware >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ >> _______________________________________________ >> iText-questions mailing list >> [email protected] >> https://lists.sourceforge.net/lists/listinfo/itext-questions >> >> iText(R) is a registered trademark of 1T3XT BVBA. >> Many questions posted to this list can (and will) be answered with a >>reference to the iText book: http://www.itextpdf.com/book/ >> Please check the keywords list before you ask for examples: >>http://itextpdf.com/themes/keywords.php > >-------------------------------------------------------------------------- >---- >Got visibility? >Most devs has no idea what their production app looks like. >Find out how fast your code is with AppDynamics Lite. >http://ad.doubleclick.net/clk;262219671;13503038;y? >http://info.appdynamics.com/FreeJavaPerformanceDownload.html >_______________________________________________ >iText-questions mailing list >[email protected] >https://lists.sourceforge.net/lists/listinfo/itext-questions > >iText(R) is a registered trademark of 1T3XT BVBA. >Many questions posted to this list can (and will) be answered with a >reference to the iText book: http://www.itextpdf.com/book/ >Please check the keywords list before you ask for examples: >http://itextpdf.com/themes/keywords.php ------------------------------------------------------------------------------ Got visibility? Most devs has no idea what their production app looks like. Find out how fast your code is with AppDynamics Lite. http://ad.doubleclick.net/clk;262219671;13503038;y? http://info.appdynamics.com/FreeJavaPerformanceDownload.html _______________________________________________ iText-questions mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/itext-questions iText(R) is a registered trademark of 1T3XT BVBA. Many questions posted to this list can (and will) be answered with a reference to the iText book: http://www.itextpdf.com/book/ Please check the keywords list before you ask for examples: http://itextpdf.com/themes/keywords.php
