SlideShare a Scribd company logo
1 of 9
Download to read offline
SENIOR PROJECT 2007-2008
(Step#4 of the ekoSign project)

8. Management Sends Order to the
Warehouse
Developing Application that Uses XML
Signatures

Project team members

Hüseyin Çakır, Mehmet Mesut Özışık, Yılmaz Kaya

Abstract: Fourth step of the application which is management sends order to the warehouse. This phase
includes XML document signatures, encryption of informations at XML, verifying XML signatures and
decrypting encrypted XML data.
Keywords: Management sends order to the warehouse, XML Signature and Encryption.

http://groups.google.com/group/digitalsignature
digitalsignature@googlegroups.com
PRINT DATE: 05/06/08

1
8.1 Introduction
This documentation is related with the construction phase of the project. Management sends order
to the warehouse is one of the parts of construction phases and the series of iterations of the system
are implemented and an executable release of the step is developed. The implementation of this step
is built according to the use case diagrams and use case by text. Figure 8.1 shows the steps of the
unified process and which step the project plan paper belongs to.

Inception

1.Introduction
2.Project Plan
3.Basic Concepts

Elaboration

4.Scenario

Construction

Transition

5.CSorder
6.SDSorderW
7.SDSorderM
8.MSorderW

Figure 8.1 Steps of Unified Process.

8.2 Management Sends Order to the Warehouse
Management receives an order from SD indicating that 1500 units of product worth of 100000$ are
needed on 21.02.2008 at 10:00. Since the cost of order is higher than 50000$, management is
authorized to sign order and send to the Warehouse (Figure 8.2).

Figure 8.2 Scenario.

2
SIGNATURES: CUSTOMER, SALES DEPARTMENT, MANAGEMENT
1500 units of product worth of 100000$ are needed on 21.02.2008 at 10:00.
XML DOCUMENT THAT CUSTOMER SENDS TO THE SALES DEPARTMENT: A sample XML includes
customer's signature, sales department signature, management signature and
encrypted order information.
<order>
<!-ENCRYPTED ORDER INFORMATION-->

<EncryptedData xmlns="http://www.w3.org/2001/04/xmlenc#"
Encrypted Customer Order
Type="http://www.w3.org/2001/04/xmlenc#Element">
<EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" />
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<EncryptedKey xmlns="http://www.w3.org/2001/04/xmlenc#">
<EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5" />
<KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#">
<KeyName>rsaKey</KeyName>
</KeyInfo>
<CipherData>
<CipherValue>NpXleAAvjsx/afFGVFM3jKDk/Dj2prknl1eXcf7+gveP7+2pa26ILGlAPV0NTFLkQxTwHSfhk
V4y0PMr7xPNQ9a8qNcsN7MPSl45OoTE0l7yJD5jD0462rlXmCwEVdgZi3Oi0LA2dto/SxCSKicxbiBIeZl1iWctRo
WfkrzgKkw=</CipherValue>
</CipherData>
</EncryptedKey>
</KeyInfo>
<CipherData>
<CipherValue>gn4aaCOi/5P2+k5HHJ2vzMltSXt6O2+SMiNXFCn8mq/fHvRxwqqSBeejPiEpI4iXg/u0AhKz2jlN
EPqbnMB17EfT81DiW5VYAPssA8NM
+cmdccTotWtj32EnOqIJNVsanPl4i/RsXFwL6a7K2YIHe6l0Tewwyj3ZWSSzHbq1c2GsGi0qBAXe1vsRrDr1cmW/C
rbJDW70YzMuoVS8IysYgm9n96Wo/dTyaGPl+fG
+Cs5KAZyDZRRSP9CXDJ38WZGGRfdQCnvhf8ztG8CuB9mruK56mtjz9rV3HkqM2etLDzcbXmkeyAErSJrS4W5n
zw7NkbZOMht2JdTN+XhcTrS2GA==</CipherValue>
</CipherData>
</EncryptedData>
<!-SALES DEPARTMENT MESSAGE-->
<salesDept Id="s">Cost is higher than 50000$, the confirmation
management.</salesDept>
<!-MANAGEMENT MESSAGE-->
<management Id="m">1500 units of product is required.</management>
<!-SIGNATURE OF CUSTOMER-->

needed

from

<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" />
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> Signature #1: Customer
<Reference URI="#c">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<DigestValue>VSh4kpOimvsxdy2hpfnozUZrL+Q=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>ScVHcqcvXt3/mfB6CVKOGG5DcFvt/30Cc9LwabCpebDCHiXtA
+bsx6AUnd1c9g6VPxrgClynopWqd9fQYBNy7e1DzOnLSn/Ya8Bzfe3SaMsTS7Xw8jmJRjTMJEsWGrEX1d/zdpa4s
5H4A0i5FNXDlrXkhO3NpS5bffD1C9CJIjw=</SignatureValue>
</Signature>

3
<!-SIGNATURE OF SALES DEPARTMENT-->

<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
Signature #2: Sales Dept.
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" />
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" />
<Reference URI="#s">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<DigestValue>cLYt4vVedV3M6Pu+/WX1uuf/K58=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>IRIhYrEwZKQcJikufCfnL0st1l7SBrZtxsq+jaJ8jP/l3yiv1MkeAkzmpH2t+RAhbG1BB
+iwjenI2IvPJRbkejj4woBtNSSNJ+VFOh9KgC3BEgJy8BQ6ub76cThLgMJ
+u0TuuyjBGGDcdRt8HJpIs7WBFLyErmPGHG5s6XieZL0=</SignatureValue>
</Signature>
<!-SIGNATURE OF MANAGEMENT-->

<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
Signature #3: Manegement
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" />
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" />
<Reference URI="#m">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
<DigestValue>orNVV1C8Ckyz3XNuGxF/Qz2wjY4=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>Yukm1rqP219Cw17HFPGikqBj
+LWvJyrvYhBr4dcUzecDdveqTCSmqpqKzEbSo8ITPlPuRIvhMJdJ9ImuM/Bbt7zvFHl48SqNqVtsFoEb
+DUXhd8uM9JnmF/SPwghHYCNneXGBB6mA+TVugDaZ3Jjxs869DCu8+zgo9TIoFeiPaQ=</SignatureValue>
</Signature>
</order>

Table 8.1 Management Sends Sample XML Order to Warehouse.

4
8.3 Use Case Diagram of Management Sends Order to Warehouse
Figure 8.3 represents Management sending the document to the warehouse and Use case text of the
diagram is shown in Figure 8.4.

Use Case Title

Figure 8.3 Use Case Diagram of Management sending order.
:Management sending order to the warehouse

Primary Actor

:Management

Precondition

:Management must validate the previous signatures

Success Guarantee :Company Policy applied and order sent to the authorized
department
Trigger

:Management receives order from sales department

Main Success Scenario:
1. Page loaded to the management staff computer.
2. Management verifies the company policy.
3. After validation the order will be sent to the warehouse.
Figure 8.4 Use Case by Text for Management Sends Order.

5
8.4 Class Diagram of Sales Department Applies Policy and Sends Order
This step uses six classes which are “signature”, “verifySignature”, “encryption”, “decryption”,
“customer” and “order”.
“signature” class includes a method “SignXml” that sign XML document and attach the signature
to the document in a <Signature> element. The method creates an cryptographic signing key, adds
the key to a secure key container, and then uses the key to digitally sign an XML document. The
key can then be retrieved to verify the XML digital signature, or be used to sign another XML
document.
“encryption” class has a method “Encrypt” that encrypts an XML element using two keys. It
generates a cryptographic public/private key pair and saves the key pair to a secure key container.
The method then creates a separate session key using a cryptographic algorithm. The method uses
the session key to encrypt the XML document and then uses the public key to encrypt the session
key. Finally, the method saves the encrypted session key and the encrypted XML data to the XML
document within a new <EncryptedData> element.
“customer” class stores two different attributes and “order” class that stores four different attributes
that is used to get data from the user interface. This class's attributes encrypted by “Encryption”
class that uses “encrypt” method to safely send data to the Company Sales Department.

Figure 8.5 Class Diagram of Sales Department Receives Order and Applies Policy .

6
8.5 Sequence & Collaboration Diagrams of Management Sends Order to the
Warehouse
Sequence Diagram shows the interactions between objects to perform critical pieces of use case
behavior in time-ordered manner. Sequence Diagram for Step#1 of the project developed in Figure
8.6 is developed from the class diagram in Figure 8.5.

Figure 8.6 Sequence Diagram of Management Sends Order to the Warehouse.

7
Collaboration Diagram that shows the interactions between objects to perform critical pieces of the
use case behavior is developed in Figure 8.7.

Figure 8.7 Collaboration Diagram of Management Sends Order to the Warehouse.

8
8.6 User Interfaces
Figure 8.8 represents an interface that is used by management staff to view and send orders to the
warehouse.

Figure 8.8 Management Interface for Displaying Orders Received.

9

More Related Content

Viewers also liked

DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...Hüseyin Çakır
 
Relazione ferramonti1
Relazione ferramonti1Relazione ferramonti1
Relazione ferramonti116francesco
 
Jews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokotJews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokot16francesco
 
Arch hasan fathi
Arch hasan fathiArch hasan fathi
Arch hasan fathiArchi UHBBC
 
Juliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, polandJuliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, poland16francesco
 
Aev school presentation
Aev   school presentationAev   school presentation
Aev school presentation16francesco
 
Gravitation theory
Gravitation theoryGravitation theory
Gravitation theoryDrDevil1998
 
Thesis Defense Exam Presentation
Thesis Defense Exam PresentationThesis Defense Exam Presentation
Thesis Defense Exam PresentationHüseyin Çakır
 
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)xaroumenimaria
 

Viewers also liked (20)

Conclusion
ConclusionConclusion
Conclusion
 
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
DEVELOPMENT OF FUZZY SYLLOGISTIC ALGORITHMS AND APPLICATIONS DISTRIBUTED REAS...
 
Cover
CoverCover
Cover
 
Introduction
IntroductionIntroduction
Introduction
 
Scenario
ScenarioScenario
Scenario
 
Project plan
Project planProject plan
Project plan
 
Appendix
AppendixAppendix
Appendix
 
Relazione ferramonti1
Relazione ferramonti1Relazione ferramonti1
Relazione ferramonti1
 
Ppt school
Ppt schoolPpt school
Ppt school
 
Jews
JewsJews
Jews
 
Jews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokotJews before world war ii, k. chabinska, l.kokot
Jews before world war ii, k. chabinska, l.kokot
 
Event dunia
Event duniaEvent dunia
Event dunia
 
Arch hasan fathi
Arch hasan fathiArch hasan fathi
Arch hasan fathi
 
Juliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, polandJuliusz slowacki secondary school in czestochowa, poland
Juliusz slowacki secondary school in czestochowa, poland
 
Aev school presentation
Aev   school presentationAev   school presentation
Aev school presentation
 
PASAR
PASARPASAR
PASAR
 
Matechef 2
Matechef 2Matechef 2
Matechef 2
 
Gravitation theory
Gravitation theoryGravitation theory
Gravitation theory
 
Thesis Defense Exam Presentation
Thesis Defense Exam PresentationThesis Defense Exam Presentation
Thesis Defense Exam Presentation
 
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
Mε τους δώδεκα θεούς από το χθες στο σήμερα(πολιτιστικό πρόγραμμα γ΄δημοτικού)
 

Similar to Step4 managementsendsorderw

A Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated InformationA Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated Informationijtsrd
 
Angular - Chapter 4 - Data and Event Handling
 Angular - Chapter 4 - Data and Event Handling Angular - Chapter 4 - Data and Event Handling
Angular - Chapter 4 - Data and Event HandlingWebStackAcademy
 
MVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVCMVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVCAnton Krasnoshchok
 
Strigil - lightning talks
Strigil - lightning talksStrigil - lightning talks
Strigil - lightning talkszviri
 
Product Analysis Oracle XML Gateway
Product Analysis Oracle XML GatewayProduct Analysis Oracle XML Gateway
Product Analysis Oracle XML GatewayAcevedoApps
 
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-ExpPrabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-ExpPrabhu S
 
Seminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clSeminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clmiket60
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management SystemMike Taylor
 
LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services LMKT Private Limited
 
Assignment3 pp v3
Assignment3 pp v3Assignment3 pp v3
Assignment3 pp v3zanmmit
 
AvinashBhat_Resume
AvinashBhat_ResumeAvinashBhat_Resume
AvinashBhat_ResumeAvinash Bhat
 
C# .NET Developer Portfolio
C# .NET Developer PortfolioC# .NET Developer Portfolio
C# .NET Developer Portfoliocummings49
 
zaid ppt.pptx
zaid ppt.pptxzaid ppt.pptx
zaid ppt.pptxaasim40
 
AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014Ran Wahle
 

Similar to Step4 managementsendsorderw (20)

A Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated InformationA Novel Secure Cloud SAAS Integration for User Authenticated Information
A Novel Secure Cloud SAAS Integration for User Authenticated Information
 
Angular - Chapter 4 - Data and Event Handling
 Angular - Chapter 4 - Data and Event Handling Angular - Chapter 4 - Data and Event Handling
Angular - Chapter 4 - Data and Event Handling
 
MVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVCMVC Pattern. Flex implementation of MVC
MVC Pattern. Flex implementation of MVC
 
Strigil - lightning talks
Strigil - lightning talksStrigil - lightning talks
Strigil - lightning talks
 
Aspmvc
AspmvcAspmvc
Aspmvc
 
Sql Portfolio
Sql PortfolioSql Portfolio
Sql Portfolio
 
CAD Report
CAD ReportCAD Report
CAD Report
 
Product Analysis Oracle XML Gateway
Product Analysis Oracle XML GatewayProduct Analysis Oracle XML Gateway
Product Analysis Oracle XML Gateway
 
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-ExpPrabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-Exp
 
Seminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_clSeminar presentation 05042011_v7_with_cl
Seminar presentation 05042011_v7_with_cl
 
Surya_CV
Surya_CVSurya_CV
Surya_CV
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management System
 
icv
icvicv
icv
 
LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services LMKT Microsoft Solutions and Services
LMKT Microsoft Solutions and Services
 
Assignment3 pp v3
Assignment3 pp v3Assignment3 pp v3
Assignment3 pp v3
 
AvinashBhat_Resume
AvinashBhat_ResumeAvinashBhat_Resume
AvinashBhat_Resume
 
C# .NET Developer Portfolio
C# .NET Developer PortfolioC# .NET Developer Portfolio
C# .NET Developer Portfolio
 
Microservices in AUTO1 by Alexander Egurtsov
Microservices in AUTO1 by Alexander EgurtsovMicroservices in AUTO1 by Alexander Egurtsov
Microservices in AUTO1 by Alexander Egurtsov
 
zaid ppt.pptx
zaid ppt.pptxzaid ppt.pptx
zaid ppt.pptx
 
AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014AngularJs Workshop SDP December 28th 2014
AngularJs Workshop SDP December 28th 2014
 

Recently uploaded

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Step4 managementsendsorderw

  • 1. SENIOR PROJECT 2007-2008 (Step#4 of the ekoSign project) 8. Management Sends Order to the Warehouse Developing Application that Uses XML Signatures Project team members Hüseyin Çakır, Mehmet Mesut Özışık, Yılmaz Kaya Abstract: Fourth step of the application which is management sends order to the warehouse. This phase includes XML document signatures, encryption of informations at XML, verifying XML signatures and decrypting encrypted XML data. Keywords: Management sends order to the warehouse, XML Signature and Encryption. http://groups.google.com/group/digitalsignature digitalsignature@googlegroups.com PRINT DATE: 05/06/08 1
  • 2. 8.1 Introduction This documentation is related with the construction phase of the project. Management sends order to the warehouse is one of the parts of construction phases and the series of iterations of the system are implemented and an executable release of the step is developed. The implementation of this step is built according to the use case diagrams and use case by text. Figure 8.1 shows the steps of the unified process and which step the project plan paper belongs to. Inception 1.Introduction 2.Project Plan 3.Basic Concepts Elaboration 4.Scenario Construction Transition 5.CSorder 6.SDSorderW 7.SDSorderM 8.MSorderW Figure 8.1 Steps of Unified Process. 8.2 Management Sends Order to the Warehouse Management receives an order from SD indicating that 1500 units of product worth of 100000$ are needed on 21.02.2008 at 10:00. Since the cost of order is higher than 50000$, management is authorized to sign order and send to the Warehouse (Figure 8.2). Figure 8.2 Scenario. 2
  • 3. SIGNATURES: CUSTOMER, SALES DEPARTMENT, MANAGEMENT 1500 units of product worth of 100000$ are needed on 21.02.2008 at 10:00. XML DOCUMENT THAT CUSTOMER SENDS TO THE SALES DEPARTMENT: A sample XML includes customer's signature, sales department signature, management signature and encrypted order information. <order> <!-ENCRYPTED ORDER INFORMATION--> <EncryptedData xmlns="http://www.w3.org/2001/04/xmlenc#" Encrypted Customer Order Type="http://www.w3.org/2001/04/xmlenc#Element"> <EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" /> <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#"> <EncryptedKey xmlns="http://www.w3.org/2001/04/xmlenc#"> <EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5" /> <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#"> <KeyName>rsaKey</KeyName> </KeyInfo> <CipherData> <CipherValue>NpXleAAvjsx/afFGVFM3jKDk/Dj2prknl1eXcf7+gveP7+2pa26ILGlAPV0NTFLkQxTwHSfhk V4y0PMr7xPNQ9a8qNcsN7MPSl45OoTE0l7yJD5jD0462rlXmCwEVdgZi3Oi0LA2dto/SxCSKicxbiBIeZl1iWctRo WfkrzgKkw=</CipherValue> </CipherData> </EncryptedKey> </KeyInfo> <CipherData> <CipherValue>gn4aaCOi/5P2+k5HHJ2vzMltSXt6O2+SMiNXFCn8mq/fHvRxwqqSBeejPiEpI4iXg/u0AhKz2jlN EPqbnMB17EfT81DiW5VYAPssA8NM +cmdccTotWtj32EnOqIJNVsanPl4i/RsXFwL6a7K2YIHe6l0Tewwyj3ZWSSzHbq1c2GsGi0qBAXe1vsRrDr1cmW/C rbJDW70YzMuoVS8IysYgm9n96Wo/dTyaGPl+fG +Cs5KAZyDZRRSP9CXDJ38WZGGRfdQCnvhf8ztG8CuB9mruK56mtjz9rV3HkqM2etLDzcbXmkeyAErSJrS4W5n zw7NkbZOMht2JdTN+XhcTrS2GA==</CipherValue> </CipherData> </EncryptedData> <!-SALES DEPARTMENT MESSAGE--> <salesDept Id="s">Cost is higher than 50000$, the confirmation management.</salesDept> <!-MANAGEMENT MESSAGE--> <management Id="m">1500 units of product is required.</management> <!-SIGNATURE OF CUSTOMER--> needed from <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo> <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" /> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> Signature #1: Customer <Reference URI="#c"> <Transforms> <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /> </Transforms> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> <DigestValue>VSh4kpOimvsxdy2hpfnozUZrL+Q=</DigestValue> </Reference> </SignedInfo> <SignatureValue>ScVHcqcvXt3/mfB6CVKOGG5DcFvt/30Cc9LwabCpebDCHiXtA +bsx6AUnd1c9g6VPxrgClynopWqd9fQYBNy7e1DzOnLSn/Ya8Bzfe3SaMsTS7Xw8jmJRjTMJEsWGrEX1d/zdpa4s 5H4A0i5FNXDlrXkhO3NpS5bffD1C9CJIjw=</SignatureValue> </Signature> 3
  • 4. <!-SIGNATURE OF SALES DEPARTMENT--> <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo> Signature #2: Sales Dept. <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" /> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> <Reference URI="#s"> <Transforms> <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /> </Transforms> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> <DigestValue>cLYt4vVedV3M6Pu+/WX1uuf/K58=</DigestValue> </Reference> </SignedInfo> <SignatureValue>IRIhYrEwZKQcJikufCfnL0st1l7SBrZtxsq+jaJ8jP/l3yiv1MkeAkzmpH2t+RAhbG1BB +iwjenI2IvPJRbkejj4woBtNSSNJ+VFOh9KgC3BEgJy8BQ6ub76cThLgMJ +u0TuuyjBGGDcdRt8HJpIs7WBFLyErmPGHG5s6XieZL0=</SignatureValue> </Signature> <!-SIGNATURE OF MANAGEMENT--> <Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> <SignedInfo> Signature #3: Manegement <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315" /> <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> <Reference URI="#m"> <Transforms> <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /> </Transforms> <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> <DigestValue>orNVV1C8Ckyz3XNuGxF/Qz2wjY4=</DigestValue> </Reference> </SignedInfo> <SignatureValue>Yukm1rqP219Cw17HFPGikqBj +LWvJyrvYhBr4dcUzecDdveqTCSmqpqKzEbSo8ITPlPuRIvhMJdJ9ImuM/Bbt7zvFHl48SqNqVtsFoEb +DUXhd8uM9JnmF/SPwghHYCNneXGBB6mA+TVugDaZ3Jjxs869DCu8+zgo9TIoFeiPaQ=</SignatureValue> </Signature> </order> Table 8.1 Management Sends Sample XML Order to Warehouse. 4
  • 5. 8.3 Use Case Diagram of Management Sends Order to Warehouse Figure 8.3 represents Management sending the document to the warehouse and Use case text of the diagram is shown in Figure 8.4. Use Case Title Figure 8.3 Use Case Diagram of Management sending order. :Management sending order to the warehouse Primary Actor :Management Precondition :Management must validate the previous signatures Success Guarantee :Company Policy applied and order sent to the authorized department Trigger :Management receives order from sales department Main Success Scenario: 1. Page loaded to the management staff computer. 2. Management verifies the company policy. 3. After validation the order will be sent to the warehouse. Figure 8.4 Use Case by Text for Management Sends Order. 5
  • 6. 8.4 Class Diagram of Sales Department Applies Policy and Sends Order This step uses six classes which are “signature”, “verifySignature”, “encryption”, “decryption”, “customer” and “order”. “signature” class includes a method “SignXml” that sign XML document and attach the signature to the document in a <Signature> element. The method creates an cryptographic signing key, adds the key to a secure key container, and then uses the key to digitally sign an XML document. The key can then be retrieved to verify the XML digital signature, or be used to sign another XML document. “encryption” class has a method “Encrypt” that encrypts an XML element using two keys. It generates a cryptographic public/private key pair and saves the key pair to a secure key container. The method then creates a separate session key using a cryptographic algorithm. The method uses the session key to encrypt the XML document and then uses the public key to encrypt the session key. Finally, the method saves the encrypted session key and the encrypted XML data to the XML document within a new <EncryptedData> element. “customer” class stores two different attributes and “order” class that stores four different attributes that is used to get data from the user interface. This class's attributes encrypted by “Encryption” class that uses “encrypt” method to safely send data to the Company Sales Department. Figure 8.5 Class Diagram of Sales Department Receives Order and Applies Policy . 6
  • 7. 8.5 Sequence & Collaboration Diagrams of Management Sends Order to the Warehouse Sequence Diagram shows the interactions between objects to perform critical pieces of use case behavior in time-ordered manner. Sequence Diagram for Step#1 of the project developed in Figure 8.6 is developed from the class diagram in Figure 8.5. Figure 8.6 Sequence Diagram of Management Sends Order to the Warehouse. 7
  • 8. Collaboration Diagram that shows the interactions between objects to perform critical pieces of the use case behavior is developed in Figure 8.7. Figure 8.7 Collaboration Diagram of Management Sends Order to the Warehouse. 8
  • 9. 8.6 User Interfaces Figure 8.8 represents an interface that is used by management staff to view and send orders to the warehouse. Figure 8.8 Management Interface for Displaying Orders Received. 9