Feeds

Trust me, I'm a developer

Code signing product suite

Security and trust: The backbone of doing business over the internet

Web services may be a clever way of conducting business with or delivering services to customers, but it also constitutes a helluva risk – after all, users get involved in downloading code from hither and yon, and are probably far too busy with their own work to ponder too deeply on whether that downloaded code is as wholesome as they assume it to be.

The same goes for mobile phone users. It is now only grumpy old curmudgeons who treat them as…… well……. telephones. For a growing army of users they are the delivery point for a whole range of new services that involve them in downloading code.

So here are two scenarios in which users are left wide open to code of any degree of malice. What can help here is a way of identifying the authorship of code and verifying its integrity as being the same as when it left the software vendor. That is the market GeoTrust is pitching at with a new Code Signing Product Suite. According to the company’s European marketing director, Steve Waite, the objective is to provide end users with security on the authorship and traceability of code by providing software vendors with a means of digitally signing their work prior to its use on public and private networks.

Software authors can sign up for the service by applying to GeoTrust, which checks that they are a genuine business. It then issues them with code-signing credentials which are embedded into Windows, Windows Mobile or Java software. This allows developers to then add a digital signature to the code. If the code is corrupted or tampered with in any way the signature fails and a warning pop-up appears automatically. Alternatively, the code can be stopped from running at all.

For mobile software it offers signing options for both privileged and unprivileged code for Windows Mobile. The latter are applications that do not affect the core operating system, such ringtones. The former category does affect the core. Here, developers need to register both with Microsoft and GeoTrust to sign up for the scheme. The cost is $159 per certificate per year for computer code, with developers then allowed as many signing as they like. For the mobile market, the cost is $295 for 10 signings, with a signing equalling a product release or a product upgrade. ®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.