Qualified electronic signature on a mobile device. "mobile" electronic signature Electronic signature on the phone

Many companies have been trying to approach the problem of implementing an electronic signature on a smartphone and in the cloud since 2010–11. At that time, the “electronic government” project was actively developing. Experts and service users, not without reason, expected that most of the services in this project could be implemented in the “cloud”, which would open up the possibility of providing simple and convenient services, based, among other things, on a “cloud” electronic signature, for other projects and areas life of Russian society. However, according to various reasons, e-government was implemented without an electronic signature in the cloud, and Rostelecom continues to offer familiar tokens to corporate and private users of State Services. Meanwhile, technologies that can still ensure the “take off” of the idea of ​​an electronic signature in the “cloud” already exist and are being successfully implemented.

What's happened electronic signature and why does it need to go to the “cloud”?

Electronic signature is increasingly becoming part of daily life citizens and legal entities. According to the legislation of the Russian Federation (Federal Law of April 6, 2011 No. 63-FZ “On Electronic Signatures”), an electronic signature is a full replacement for a handwritten signature and has full legal force. For ordinary citizens, an electronic signature provides remote interaction via the Internet with government agencies, educational and medical institutions. It allows companies and organizations to participate in electronic auctions, organize legally significant electronic document flow, submit in electronic format reporting to regulatory authorities.

For information

In the most general sense, an electronic signature is the result of a cryptographic transformation of an electronic document using the so-called “electronic signature key”. It allows you to unambiguously identify the person who signed the electronic document, as well as detect the fact that changes have been made to it after the moment of signing. An electronic signature is created using so-called “electronic signature tools”, which can be certified (this is a prerequisite for the formation of a qualified electronic signature) or uncertified (used for an unqualified electronic signature).

With a certain degree of simplification, we can say that the security of an electronic signature and the services provided on its basis is based on the fact that the electronic signature keys are kept secret, in a protected form, and that each user responsibly stores his signature key and does not allow incidents. And therefore, cryptographic algorithms and protocols, as well as software and hardware-software solutions based on them for generating an electronic signature, use these keys to provide the required information properties: integrity, reliability, authenticity (authenticity, non-repudiation).

“Traditional” and reliable carriers of electronic signature keys are electronic keys - a token or a smart card - which, being certified cryptographic means, must be subject to strict accounting and issued in strict accordance with the rules and requirements of industry regulators. At the same time, among interested specialists, a bold assumption was repeatedly made that if it were possible to find another solution and completely get rid of tokens, switch to some “easier for the user” technology for storing signature keys, then the number of legal entities and citizens using electronic signature would increase significantly. In this regard, the transition to “cloud” storage of signature keys has long seemed to experts to be a promising solution. This idea gradually became even more relevant as smartphones and tablet computers, since connecting a token or smart card to them is far from a trivial task. “Cloud” storage of signature keys seemed to be a very convenient solution for fans of working and receiving information services directly on mobile devices without additional reading devices - tokens and smart cards.

In fact, the very idea of ​​storing the user’s electronic signature key in the “cloud”, in some “super-secure” place, for example, in an HSM (Hardware Security Module or as it is also called in the “hardware security module”) or somewhere Also, this idea is far from new. Moreover, this is a fairly common practice in a corporate environment, since the experience of using HSM to store user private keys in corporate infrastructure goes back almost ten years. Thus, the transition to this key storage technology on the scale of public services has long been considered as one of the most difficult, but, nevertheless, potentially possible options. And in this regard, only one cornerstone security question remained: “how will a specific user-holder of an electronic signature key stored in the cloud gain access to this key”?

Access to the cloud - which option to choose?

One of the first, back in 2011–12, was the company CryptoPro to offer its “cloud” electronic signature technologies. This was the CryptoPro DSS (Digital Signature Server) service, based on the use of the CryptoPro HSM solution for storing electronic signature keys. As a method of accessing user keys, several options were offered to choose from: a multiple-time password, a one-time password, authentication using a token connected to a computer.

The first option – a reusable password – means that in order to sign something in the CryptoPro DSS “cloud”, the user must first authenticate in this “cloud” using a password. And in this regard, the user receives all the “delights” associated with using a reusable password: all security experts have been talking about the insufficient level of security of reusable passwords for decades, which is proven by many incidents with stolen password databases and often very in simple ways these passwords can be guessed or stolen.

The second option, a one-time password, involves transmitting a one-time sequence of characters for user authentication in the “cloud” via SMS or its generation using an OTP token (One Time Password). The most significant disadvantage of one-time passwords is that they are not tied to the operation that is confirmed with their help. That is, a one-time password can confirm any operation, even one created by an attacker. This fact has given rise to a large number of fraudulent schemes to “extract” these passwords from users - from fake sites and applications (phishing) to social engineering (extracting codes during personal communication). Linking to details is possible when sending a code via SMS, but this channel has long shown its complete inconsistency for transmitting confirmation codes (that is, one-time passwords), since SMS can be “intercepted” by dozens of different ways, the simplest of which is a Trojan app for a smartphone.

The third option is authentication in CryptoPro DSS using an electronic key (token or smart card), which is connected to the user’s computer. Of course, this is the most secure and familiar option for two-factor authentication and access to information resources and services. But, on the other hand, if the user has a token, then why does he need the CryptoPro DSS “cloud” with electronic signature keys? We install the crypto provider on the computer and the user gets the opportunity to work peacefully! Moreover, in some cases, signing documents with an electronic signature is possible in the token itself, which is one of the “ best practices" in the security industry. Those. the whole idea of ​​​​simplicity and accessibility of an electronic signature in the “cloud” is killed in the bud by this option.

When analyzing the specifics of using a particular method of gaining access to electronic signature keys “in the cloud,” it should be taken into account that an electronic signature, as a rule, is accepted by some legally significant action (service). And its demand is due to the high level of security, which is ensured by keeping the signature key secret and strong cryptographic algorithms. And if one of the authentication methods is used to access the key (reusable password, one-time password, SMS, etc.), then it turns out that the security properties of the electronic signature itself are replaced by the security properties of the authentication mechanism used. Since the security of the entire system is determined by the security of its weakest link, the electronic signature system as a whole cannot be more secure than, for example, a password for accessing signature keys. In practice, this may mean that an attacker receiving a password will allow him to sign any documents on behalf of a legal user, which is completely unacceptable for the implementation of “cloud signature” services with legally significant consequences.

Electronic signature on mobile device. Problems and positive experiences.

Subsequently, many more serious and quite successful attempts were made to offer technologies and implement large-scale projects using “cloud” electronic signatures. These were also the operators mobile communications, and large international companies, such as Gemalto. But one of the most successful was the experience of the Finnish company Valimo, which, along with the mobile operator EMT (currently Telia Eesti), became an active participant in a project successfully implemented in Estonia mobile identification Mobil-ID. By the way, the Mobil-ID project, being a full-fledged mobile alternative to the famous Universal Electronic Card of Estonia (ID-card), provided citizens with the possibility of a not entirely “cloud” electronic signature. The solution allowed subscribers, using their mobile devices and special SIM card capabilities, to sign electronic documents and confirm requests for e-government services. That is, the SIM card has become a means of electronic signature, and the solution generally provides services for generating a signature through interaction with a specific subscriber.

For information

The active phase of the Universal Electronic Card project in Estonia began in 2000. By the end of 2011, more than 1.1 million Estonian citizens (out of 1.6 million inhabitants at that time) had received plastic identification documents (ID cards) equipped with almost two dozen security elements: smart card chip, microprinting, hologram, etc. . An identification application was installed on the smart card chip, which required the user to enter a PIN code when interacting via the Internet with electronic government information systems, as well as an electronic signature application with its own separate PIN code. Thanks to this, the ID card has become a full-fledged means of identifying a person, on which both the personal data of a citizen of the country and the electronic signature key are stored. The only limitation was the need to use a personal computer or laptop, as well as an ID card reader.

In 2007, the Mobil-ID project was launched in Estonia, initiated by the mobile operator EMT (now Telia Eesti). The idea of ​​the Mobil-ID project was to record the mentioned citizen identification applications and his electronic signature on a SIM card mobile operator. Thus, the Mobil-ID user was able to identify himself using mobile phone, and this no longer required an ID card reader.

Currently, Mobil-ID is a Telia Eesti service - a full-fledged digital identity card in a personal smartphone (https://www.telia.ee/era/mobiil/lisateenused/mobiil-id). Mobil-ID certificates are issued by the Estonian Police and Border Guard Department, therefore, similar to an ID card, the Mobiil-ID service allows you to carry out various electronic transactions, receive e-government services, conclude contracts, sign documents with an electronic signature and vote in elections. The service is available to users both in Estonia and abroad, and although it was not a full-fledged “cloud” service, until recently it remained the only option for carrying out electronic transactions on a smartphone or tablet.

Several well-known companies on the market tried to adapt these technologies for Russia, but the Aladdin R.D. company advanced the furthest. The developer of authentication and electronic signature generation tools successfully went through the process of testing the technology at MegaFon and MTS, but, unfortunately, the project was not launched nationwide. What, in our opinion, are the reasons that did not allow the implementation of a promising project?

Firstly, SIM cards were no longer “regular SIM cards”, and due to the complexity of the tasks being solved and the requirements for them, they became several times more expensive. According to some reports, the cost increased up to 10 times, and someone had to compensate for these costs. For comparison, Estonia’s positive experience was largely due to the fact that Mobil-ID was the driving force in the project mobile operator with government participation, which could afford to incur additional costs and coordinate its actions with other operators. And in Russia, to implement a similar project, it was necessary to coordinate the efforts and share the costs of the 4 largest mobile operators. At the same time, the solutions themselves - applications for identifying the user and generating his electronic signature - had to be installed on SIM cards of subscribers of all operators throughout the country, which greatly complicated the issues of SIM card production and the issues of their logistics on the scale of Russia, which has two orders of magnitude larger population than Estonia.

Secondly, a very complex organizational issue arose regarding the primary identification of citizens who receive SIM cards with an electronic signature. Currently, with certain reservations, any of us can buy a SIM card for ourselves, for members of our family, friends, but if this project started, then operators would be strictly obliged to carry out primary identification (for example, the way banks do now Federal Law of August 7, 2001 No. 115-FZ “On combating the legalization (laundering) of proceeds from crime and the financing of terrorism”). Accordingly, the costs and labor intensity of operators’ business processes would immediately increase significantly.

And thirdly, the eternal question arose: “Why?” What public services and services of commercial companies, provided exclusively on the basis of an electronic signature, were ready to be offered to individuals and legal entities in Russia? At that time, unfortunately, such services had not yet been provided, so there was no critical need to start the project yet.

Currently, an attempt to implement a “cloud” signature using SIM cards, announced by 1C, is ongoing. The technologies underlying this project were briefly presented mainly to Russian financial institutions (as part of the Ural Forum " Information Security financial sphere" 2017). Now there is very little information about the progress of this project and only time will tell whether users’ expectations of receiving a “cloud” signature using SIM cards from the 1C company will be met.

Another noteworthy promising attempt to implement a “cloud” signature for access from mobile devices was MegaFon’s own project. In this project, the operator proposed a compromise solution: to use an HSM to store electronic signature keys, and to provide users with access to their signature keys, a client part based on a specialized applet on a SIM card that generated simple one-time passwords.

On the one hand, the advantages of the proposed solution were obvious: there was no need to perform complex cryptographic operations on the SIM card, and, accordingly, more complex and expensive SIM cards with integrated cryptographic coprocessors were not required. The budget for such a project would be more realistic. But on the other hand, one-time passwords, which in the past were generated on OTP tokens, were again offered to access signature keys. These one-time passwords were simply “transferred” to the SIM card with all their shortcomings and limitations. Thus, again, the security of the entire electronic signature system would be replaced by the security of the signature key access password, and it would not be safer or more convenient to use than a simple one-time password.

What does the market expect from electronic signatures now?

Currently, the market is experiencing another surge of interest in cloud-based electronic signatures. It is noteworthy that this interest is predetermined by purely practical business objectives.

One of these tasks is the so-called “one-time signature”. In many areas, it is now required to provide a qualified electronic signature once, and solutions for generating such a “one-time signature” (without using signature keys again) are extremely in demand. Obviously, the “classic” options for issuing an electronic signature to clients are not entirely suitable - the timing and cost of issuing a token or smart card, deploying a crypto provider on the client’s computer, generating signature keys, issuing a certificate - all this is too complicated, expensive and time-consuming for one single signature . In such circumstances, offering a cloud signature seems to be a very suitable choice.

A case in point is real estate transactions. In particular, many developer companies and real estate traders work with clients in a certain “standard generally accepted” way: a client comes to them, and in order to register the transaction with the Federal Service for State Registration, Cadastre and Cartography (Rosreestr), it is necessary to collect the established package of documents, go to this Rosreestr, submit these documents for registration, and then make another visit and receive the appropriate certificate for registration of ownership. It is noteworthy that now all this can be done electronically, at least Information Systems and the processes of Rossreestr allow this. In order to do this, you only need a qualified electronic signature of the parties to the transaction, with which the client and the developer will sign the generated package of documents. And the client only needs this operation once. Of course, real estate developers and traders, as well as other market players whose business requires a “one-time” electronic signature of the client, will not build a system for generating a signature in their infrastructure. They will use services that, by the way, some companies are already trying to offer.

For information

What does it mean when it says “an electronic signature has been issued to the client”? Every specialist will say that the signature itself is the result of cryptographic transformations of the information being signed, and the signature cannot be “issued” on a Flash media, token or smart card. And most certainly this is not just a means of signing - a direct technical means for generating electronic signatures of documents. So what is the correct use of a term that, as in other specific fields, has become a jargon?

So, an electronic signature “issued” to a specific client implies the presence of three components:

The first is an electronic signature facility. That is, directly a technical tool that implements a set of cryptographic algorithms and functions. For example, it could be a crypto provider (CryptoPro CSP, ViPNet CSP), an independent token (EDS Rutoken, JaCarta GOST) or a “cloud”.

The second is the key pair generated by the electronic signature tool. One of the keys in this pair is the electronic signature key (it is also sometimes called the “private” key), which is used to generate the signature. In the most general case, the “private” key can be stored in various places: on a computer (although this is very unsafe), on a flash drive (also unsafe), on a token (better, but unsafe), on a token/smart card in a non-removable form (the safest option). The second of the keys is the public key for verifying the electronic signature. It is necessary so that anyone can verify the correctness of the electronic signature. This key is not a secret, but is uniquely tied to the "private" key.

The third is the electronic signature verification key certificate, which is generated by the Certification Authority. Why do you need a certificate? When a person uses an existing electronic signature to generate a key pair, it will physically represent two impersonal sets of bytes. And when a person transfers a public key to someone for subsequent verification of an electronic signature, there is always a risk that this public key (an impersonal set of bytes) will be replaced by someone during the transfer process. And, accordingly, an attacker who has replaced this public key with his own will be able to impersonate a signer by simply intercepting messages, changing them and putting his electronic signature. To prevent this from happening, it is necessary to associate an anonymized set of public key bytes with the identity of a specific client, with a specific person or organization. And this is exactly what Certification Authorities (CAs) do. That is, a person or representative of an organization comes to the Certification Center, shows his passport and says: “Here I am, Ivan Ivanov, here is my electronic signature verification key. Please give me a document that this public key belongs to me – Ivan Ivanov.” And this document is the certificate. And the Certification Center is responsible for it, for its correctness. The CA is responsible (financially and administratively) for the certificates it issues. And if in some transaction a verification key certificate appears, issued in the name of Ivan Ivanov, but with a public key that does not belong to Ivan Ivanov, the CA will be responsible for this transaction. Moreover, the liability, as stated in the legislation, is about 50 million rubles. This is a very serious financial responsibility. That is, a CA is an organizational unit that deals with “matching” public keys and identities in the physical world.

In accordance with the legislation of the Russian Federation, there is a distinction between “electronic signature verification key certificate” and “qualified electronic signature verification key certificate” (qualified certificate), the first of which is issued by the Certification Center, and the second by the Certification Center accredited in accordance with the legislation of the Russian Federation. It is important to understand that the electronic signature verification key itself (public key) is a technical concept, while a public key certificate and a Certification Authority are an organizational concept.

Thus, when we say that a person has been “issued an electronic signature,” we mean that:

1. He has been given a signature device.

2. It has a key pair: a public and a private key, with the help of which an electronic signature is generated and verified.

3. The Certification Authority issued him a certificate for a public key, that is, the CA verified that the corresponding public key from the key pair actually belongs to this person.

And in relation to the “cloud” electronic signature, when we say that a person has been issued a “cloud” electronic signature, this means that a key pair was formed for the person in the “cloud”, they made sure that the public key actually belongs to this person, and issued the corresponding certificate, and that person was given a means to access their keys in the cloud.

Another business task is to become mobile. It's no secret that the user's attachment to the workplace with personal computer goes beyond the horizon by leaps and bounds. There are more and more scenarios for using services that involve working on a personal mobile device: usually a mobile phone or maybe a tablet.

Decision-making systems of collegial bodies, document flow, remote banking services, company management, electronic trading– these and many other services require ever shorter response times and greater mobility.

The business providing these services cannot fail to respond to these demands. And the electronic signature tools used must also meet them. And “traditional” tools, such as crypto providers and tokens, do not have the ability to work on mobile devices. And “cloud” technologies solve this problem.

Signing documents as a service - a professional bluff or a real service?

So, what is the point of a “one-time” qualified electronic signature service? When a client comes to complete a transaction, if he has a qualified electronic signature, it would be possible to collect and send documents, for example, as in the example with real estate, to the Russian Register in electronic form. And no one else should go anywhere. This is convenient, but the client needs to provide a qualified electronic signature, and where can one get it for a “one-time” signature? And recently, companies have appeared, usually Certification Authorities, which offer clients a “one-time” and “cloud” signature for little money. “We will make a qualified electronic signature for you,” such companies say. That is, a certain organization, at the client’s request, generates a key pair for him, here, in its Certification Center, issues a certificate for him, takes the collected set of documents from this person, signs on his behalf, and returns the already signed set of documents to the client himself. Of course, it’s convenient for solving a specific problem. But can such a service be considered legitimate?

In theory, under ideal conditions, this could probably be considered a “one-time” service. But from a legal point of view, from the point of view of common sense and the principles of electronic signatures themselves, enshrined in No. 63-FZ “On Electronic Signatures,” not everything is so smooth. Judge for yourself: some organization with rights incomprehensible to a particular person generates an electronic signature key for him and issues a qualified public key certificate in the name of this person. As a result, we get a complete set for generating an electronic signature, which, in its legal significance, is a replacement for your own handwritten signature. Using an electronic signature key, you can sign any documents and execute any orders that government authorities should take as a guide to action, since a public key certificate has already been issued and can be provided. The orders can be any, up to changing the first and last name. The paradox of the situation is that a person, having used such a service, no longer controls it in any way!

Of course, the legal agreements between the client and the company that are concluded to provide such services can be anything: a power of attorney for the formation of an electronic signature, an order, an agreement. The companies providing these services are very different, and they may have different legal structures, including well-thought-out ones that provide a certain guarantee of safety and quality of service. However, from the point of view of common sense, from the point of view of the principles of electronic signature, services in this form are not entirely correct. In our example of registering ownership rights to a property, nothing prevents the same company from first registering ownership rights to a client, and then in the next batch sending an application for re-registration of this ownership right to a completely different legal entity or individual. There are a huge number of fraud schemes: they have a certificate, they have an electronic signature key, they have all the details for the property itself. And nothing prevents them from using these funds, and no one will control or change this.

For information

Unfortunately, there was a precedent for a service company using an electronic signature key and a certificate for its client. Everything started logically and correctly: the Certification Center was registered and accredited, a set of certificates was issued for very real existing individuals who were provided with “one-time” electronic signature services. But subsequently, the client’s property worth several hundred million rubles was “stolen.” The unsuspecting owner came to carry out transactions with his property, but found out that it had not belonged to him for a very long time: the property rights had been re-registered through several persons and the “final buyer” was quite respectable. The scandal was very big. Among other things, this incident marked the beginning, so to speak, of a “cleansing” of certification centers.

A scheme where a person cannot control their signature means potentially carries the risk of a large amount of fraud. Even if it is not the company that provides the service, even if it is an unreliable employee, for example, just an operator, but this will not make the fraud any less significant. Thus, a property in Moscow worth several tens of millions of rubles is half or even the entire amount of earnings of an average employee over his entire working life. Therefore, unreliable employees may decide: “let’s take away this property, and then burn it all with fire!” Thus, the scheme for providing “one-time” signature services itself has the potential for fraud. Of course, it is not a fact that these opportunities will necessarily be realized, but they exist, and they are completely real.

So, it turns out that schemes for providing “one-time” signature services are “on the verge of legality and illegality.” They can be used until someone digs deeper. In 2016, there was a big scandal with one very large bank, which also stated that they use a “cloud” qualified signature with access via SMS. As soon as all this was revealed, the bank was shocked by a series of inspections by regulators, in particular, by the Russian Federal Security Service. And very quickly the bank’s offers of these services to clients ended and were never resumed. By the way, the bank’s contractor for this work was one of the most famous companies - operators of electronic reporting, one of the largest certification centers in the country recognized by clients.

Some service companies go further, although they provide a similar scheme. They also generate electronic signature keys for their clients, use a developed and more reliable system for managing the process of providing such “one-time” electronic signature services, but confirmation for signing client documents is made via SMS. For this reason, as we found out earlier, this entire system cannot be fully considered a qualified signature tool. Companies very convincingly explain that they bought a certified HSM, show paper on it: “Here we use a certified tool and confirm transactions using SMS.” But why doesn’t anyone read further on how to use this certified HSM? Meanwhile, in the “Rules of Use...”, which are an integral part of the industry regulator’s certificate, it is written that in order to provide access to HSM from the user to sign documents, it is necessary to install a set software, establish an encrypted secure channel, and so on and so forth. Because HSM is not a piece of hardware for use by arbitrary remote users, but a means for performing a set of specific operations within a specific organization, where it is possible to build a secure channel directly to this piece of hardware.

CryptoPro myDSS. Qualified electronic signature on a smartphone

Returning to the considered options for accessing electronic signature keys in the cloud, we will try to sum up some results and tell you about the complex solution CryptoPro myDSS. SafeTech specializes in transaction and document confirmation systems, especially in the banking sector, which has always been at the forefront of attacks by cybercriminals, and at the forefront of technologies to counter these attacks. This specialization allowed the company to develop its own PayControl () solution, which allows you to securely confirm operations and sign documents using a mobile phone: be it payment documents, login operations to portals or others informational resources and services.

Partnership with the CryptoPro company allowed us to find a stable niche for a comprehensive solution: a method for generating signature confirmations based on PayControl technologies was introduced into the CryptoPro DSS cloud service. The joint solution uses Hi-tech cloud-based key management and electronic signature functions and has a secure, mobile and convenient way to access signing functions. In a complex solution, in order for the “cloud” (server part) to perform the signing, it needs permission to perform this action. The sanction depends on four components: time, the content of the document being signed, the unique characteristics of the smartphone, as well as a unique key that is stored on the user’s smartphone in a protected area. Of course, this is far from a one-time or multiple-password scheme; SMS, which in itself is unsafe, is not used here - this is a significantly more secure technology for confirming transactions and documents. And it is implemented in the form of a mobile application for modern mobile platforms.

Having developed and documented the scheme collaboration, the companies CryptoPro and SafeTech implemented it and submitted the solution for certification in Federal service security Russian Federation. IN currently It can be argued that the complex solution CryptoPro myDSS () as a whole, including the server part (in which the electronic signature keys are stored in the HSM), a system for managing signature generation processes on the server side, a smartphone application (which visualizes the document being signed to the user and develops sanctions for signing), as well as channels of interaction between the client and server parts with implemented methods of protecting this channel - this entire complex solution is a full-fledged electronic signature tool. That is, with a certain degree of simplification, we can say that CryptoPro myDSS is a large token.

Currently, no one can be surprised by the trend towards “mobility”, abandoning the once traditional “hardware” and other devices for user authentication and electronic signature generation. Many users habitually work from tablets and smartphones, to which it is simply impossible to connect tokens and smart cards. In addition, market participants and users themselves recognized that SMS messages as a means of confirming transactions and documents have become far less secure and prohibitively expensive. For this reason, everyone began to pay attention to cloud signature technologies and secure technologies for accessing the keys of this signature. In this sense, the appearance on the market of the CryptoPro myDSS solution could not have come at a better time. Currently, the CryptoPro company is actively working to certify the solution in the FSB of Russia; a certificate has already been received for the server part of the CryptoPro DSS solution; certification of the entire solution is next in line.

The development of cloud signature technologies and technologies for secure access to electronic signature keys has gone through a rather long process of formation. This was not an easy path, but, as often happens, a path passed through trial and error. The solution developed to date, indeed, allows users to refuse to install crypto-currency on their computer, to refuse to purchase tokens and to be tied to their immediate workplace. Nowadays it is really possible to very simply and conveniently place a qualified electronic signature from your smartphone, gaining access anywhere and at any time. You can already sign any documents with your electronic signature, while maintaining all the security properties, and also, as they say, sign “with all the convenience.”

Guys, we put our soul into the site. Thank you for that
that you are discovering this beauty. Thanks for the inspiration and goosebumps.
Join us on Facebook And In contact with

10 years ago, to do 10 things, you needed 10 different devices. Today, many things for us have been replaced by the smartphone. We call, write, watch TV, read media and even pay using our smartphone. But that's not all.

We are in website found a few more useful tools from your smartphone, which can help you in your daily life.

Inscription on the lock screen

  • You've lost your phone and the screen is, of course, locked graphic key. Secret code Only you own it. It would seem that there is no hope for the return of your favorite gadget. It turns out that there is! In new Android versions you can add a message to the lock screen and, for example, ask to return the gadget.
  • “Settings” - “Screen lock and passwords” - “Signature on the lock screen”. You can leave anything - a backup phone number or e-mail.

Guaranteed return of a lost smartphone

  • If the inscription is small, then you can play it safe. Anti-theft class applications will help. They have a wide range of actions. For example, Cerberus can secretly take pictures with a camera, activate a microphone, lock a smartphone and/or delete data from it, find out its coordinates, or sound a loud alarm to attract the attention of others.

Memory saving mode

  • Sooner or later, your smartphone's memory will let you down. To avoid this, you can use a flash drive, cloud services like Dropbox, or upload photos to your computer. Or you can be original and upload the photo to Telegram Messenger.
  • Telegram allows you to send files, messages, and links to yourself. It can be freely used both as cloud storage and as notebook. Just find your own number and text as much as you like.

Security system from a smartphone

  • One of the options for using an old smartphone is to create a simple security system for your home. Motion sensor app will turn your smartphone into a surveillance camera that takes pictures whenever someone appears in the frame. Photos are sent to you immediately.
  • You can also find out more about how you can assemble such a gadget. You can use your smartphone as a baby monitor for your child(in this case you will need an application that responds to noise). But remember that for real safety it is better to use special devices.

DVR

  • Another useful feature of using a smartphone camera is a video recorder. The smartphone must be secured so that the camera has maximum visibility. For maximum effect You can use applications that are designed to turn your smartphone into a DVR.
  • Certainly, we're talking about It’s not about using it all the time (for this it’s better to buy a good DVR). But this is useful, for example, in cases where you rent a car on a tourist trip or use car sharing.

Access to the magic menu

  • If you take your phone very seriously and spend a lot of time with it, then there is nothing wrong with giving it a detailed customization. To do this, you need to go to the “Developer Menu”.
  • Settings - “About phone” - tap 7 times on the “Build number” item. Congratulations, you are now a developer! This menu has many options to improve the performance, connection quality and appearance of the system.

Ultraviolet detector

    An ultraviolet detector is not only fun, but also useful. For example, it can be used to check banknotes for authenticity. You can do it at home with tape, a couple of markers and a smartphone.

    You will need a smartphone with a flash (flashlight), purple and blue markers and tape. Place a piece of tape on the flash, paint it with a blue marker, add another layer of tape on top, paint it with purple, then add two more layers in the same sequence. Ready! You can find out more about this simple device

Construction level from a smartphone

  • Smartphones have long been equipped with an accelerometer and a gyroscope - sensors that allow you to determine the position of the device in space. By downloading the application for Android or iOS, you can replace a standard construction spirit level with it. At least for small household needs, it is definitely suitable. For professional construction it is better to use a separate tool.

Interesting statistics

  • If you or your loved ones have begun to notice that you literally won’t let go of your smartphone, then perhaps it’s worth thinking about. To understand how dependent you are on your phone and which application is “interfering” with you, you can find interesting statistics.
  • Doing this in iOS is as easy as shelling pears: “Settings” - “Battery” and click on the dial key to the right of the “Last 7 days” column. You will see a list of the most popular applications in descending order. But for Android you will have to install an application (yes, another one), for example, Instant.

Monochrome mode

  • To save battery power and protect your eyesight, when reading, you can use monochrome mode. To do this, in the developer’s “magic” menu you need to find the “simulate anomaly” item and turn on monochrome mode. This way your smartphone will display the picture in black and white.

First you need to get a certificate in .
Download the archive containing the certificate and key obtained from the link. Unpack it on your smartphone into any folder convenient for you.
Download. Unpack the archive into any folder convenient for you on your smartphone and install the application.
You can install on any disk, i.e. both in the phone memory and on the memory card.

Launch the application FreeSigner.

1. First of all, you need to set the program settings for signing, specify the path to the certificate and key. To do this, go to the menu item Functions - Parameters.

2. At this step, we have finished setting up the Settings and will now move directly to signing applications. On the menu Options press the right soft key Back, thereby exiting the settings and applying them.

In the main program window, select the item Add a task and press the joystick in the center.

Using the built-in file manager We indicate the drive, and then the directory in which the application is located that you need to sign.

Select the file that needs to be signed and press the left soft key. Select from the menu Add.

Before a new task is added, a window will appear asking what action needs to be performed:

  • Sign Sis - sign personal certificate, issued under your IMEI.
  • Self Sign Sis - sign with a general certificate.
  • Remove Sign - remove a signature.
To sign applications with the personal certificate that you just received, you must select Sign Sis.

With this action we add a new task for the application FreeSigner- signature of a specific application with the specified parameters (selected: personal certificate, key to this certificate and password for the key).
Pay attention to the icons for each item; this symbol next to the created task will tell you whether you have made a mistake in choosing an action. Those who sign with a personal certificate - you should have an icon with one Latin letter S.

Press the left soft key and select from the menu Begin. With this action, we begin executing all the tasks you added to the list (you can create several tasks).

Now you can go to the directory where you specified to save the signed file. In my case, I chose to save next to the original file, i.e., in the same directory. We find our new file, it will be added to its name _signed(which means signed). We begin installing the signed application, if you need to install it.

If you decide not to perform the created tasks that you added to the list, you can use the menu item Clear tasks, thereby removing all tasks from the list.
If you make an error, a message will be displayed stating that an error log is being maintained in the specified path. Follow this path and view text file with error log.

Brief description of the program's capabilities FreeSigner 1.01:

  • knows how to use different keys
  • automatically deletes the old signature when signing the application
  • works with sisx extensions
  • can perform several tasks at once, namely: for example, sign several applications
  • works correctly on 5800
  • does not know how to check the certificate-key pairing (i.e., the correspondence of the key to the certificate).
    Use only the key that comes in the archive along with the certificate!

After all, you use mail from Google, don’t you? Setting up your signature in Gmail on Android will allow you to unobtrusively convey to the recipient the information you need (or not so much) :)

For example, the letter was sent from a mobile device. Or that it was written from work. Or it will simply contain your name and something else (the address of your blog or social network page, for example). By the way, if you indicate in your signature that the letter was sent from a mobile phone, your addressee may be more lenient with your typos :) After all, you are much more likely to make mistakes when typing from a phone :)

The Gmail web interface easily allows us to create any signature that will be automatically added to your messages at the very end. What about adding a signature directly to Android?

Fortunately, mobile app Google mail also supports this feature.

Now let's move from theory to practice - let's establish a signature.

We launch the Gmail application on our Android device.

Swipe to the left to bring up the menu. Scroll to the very bottom and find the “Settings” item there. Let's go into it. Here we see a list of your accounts associated with this email application. As I wrote earlier, an email client, including third-party mail (Yandex, Mail.ru, Yahoo, etc.). So, select the account we need and log into it.

In the list that opens, select the “Signature” option. We go there and add the data that we want to see in our messages Email as a signature. You can enter multiple lines by pressing the Enter key to move to the next one.

The right word or phrase can make any photo a thousand times better. And if its choice depends only on you, then fonts, size and appearance It is better to choose using applications that are created for this.

We've selected 9 apps that make photo text look cool, and they're all either free or minimally expensive.

Word Swag

Inserting text is easy with Word Swag. To configure, only 3 buttons are given that change the color, transparency and background of the image. The size of the text changes with gestures, and you can also tilt it. An excellent application and if you don't mind its price, we recommend it!

Phonto

Phonto is one of the first, if not the first, app for adding text. Its advantage is that it is free and simple. However, there are also disadvantages - in-app purchases. If the standard font database is not enough for you, but it should be said that it is large enough, you can purchase additional fonts for a fee.

Typical

A good application that exists in both paid and free version. The only difference between them is a small advertising bar at the bottom. But in general, Typic will satisfy any experienced Instagramographer. There is a large selection of fonts and the ability to edit them.

Over

I'd probably make Over my favorite. this review. At least this is the application I use. Over is very simple, but nevertheless functional. After entering the text and choosing its color, a ring appears in front of us, by twisting which we can choose between different text styles, each of which is very cool.

Using in-app purchases, you can purchase an additional set of fonts, but even the standard ones are enough!

Font Candy

Font Candy is a more professional application that allows you to work not only with text, but also with layers. Of course, this is not Photoshop, but you can still do some operations. For example, put an additional layer with a background image under the text. Not for everyone, but if you understand the application, you can take photos that are different from all the others!

BubbleFrame

BubbleFrame allows you not only to overlay text on a photo, but also to make a real postcard or collage out of it. I couldn't do anything useful, but this is more my problem than the application's problem. If you want to do something special, then BubbleFrame is perfect for this.

PicLab

PicLab moves a little away from the concept of adding text and besides that it also offers various filters and image editing. In addition, you can also use it to draw on photographs and this is done quite quickly and turns out well. The app is free, but if you want to get rid of the watermark at the bottom, you'll have to pay $0.99.

WordFoto

Sometimes the name alone is enough to understand that you don’t like the application. And despite the fact that the word “photo” is misspelled here, we’ll chalk it up to a marketing ploy. WordFoto has a large collection of fonts, but the fact that the application has not been updated since 2011 makes you think about choosing a better option.




Top