Normas - ST.90 Página: 3.90.1

Total Page:16

File Type:pdf, Size:1020Kb

Normas - ST.90 Página: 3.90.1 MANUAL DE INFORMACIÓN Y DOCUMENTACIÓN EN MATERIA DE PROPIEDAD INDUSTRIAL Ref.: Normas - ST.90 página: 3.90.1 NORMA ST. 90 RECOMENDACIONES PARA EL TRATAMIENTO Y LA COMUNICACIÓN DE DATOS DE PROPIEDAD INTELECTUAL MEDIANTE INTERFACES DE PROGRAMACIÓN DE APLICACIONES (API) PARA SERVICIOS WEB Adoptada por el Comité de Normas Técnicas de la OMPI (CWS) en su octava sesión, celebrada el 4 de diciembre de 2020 Índice INTRODUCCIÓN ............................................................................................................................................................ 3 DEFINICIONES Y TERMINOLOGÍA .............................................................................................................................. 3 NOTACIONES ................................................................................................................................................................ 4 Notaciones generales ....................................................................................................................................................... 4 Identificadores de normas ................................................................................................................................................ 4 GRADO DE APLICACIÓN .............................................................................................................................................. 5 PRINCIPIOS DE DISEÑO DE UNA API PARA SERVICIOS WEB ................................................................................ 6 API WEB RESTFUL........................................................................................................................................................ 7 Componentes de los URI.................................................................................................................................................. 7 Códigos de estado ............................................................................................................................................................ 9 Principio de selección cuidadosa ..................................................................................................................................... 9 Modelo de recursos .......................................................................................................................................................... 9 Compatibilidad con múltiples formatos ........................................................................................................................... 12 Métodos HTTP ................................................................................................................................................................ 12 Patrones de consulta de datos ....................................................................................................................................... 18 Control de errores ........................................................................................................................................................... 24 Contrato de servicio ........................................................................................................................................................ 26 Tiempo de espera ........................................................................................................................................................... 27 Control del estado ........................................................................................................................................................... 27 Gestión de preferencias .................................................................................................................................................. 29 Traducción ...................................................................................................................................................................... 29 Operaciones de larga duración ...................................................................................................................................... 29 Modelo de seguridad ...................................................................................................................................................... 30 Modelo de madurez de la API ........................................................................................................................................ 35 API WEB SOAP ............................................................................................................................................................ 36 Normas generales .......................................................................................................................................................... 36 Esquemas ...................................................................................................................................................................... 37 Nombres y versiones ...................................................................................................................................................... 37 Diseño del contrato de servicio web ............................................................................................................................... 38 Adhesión de políticas a las definiciones WSDL ............................................................................................................. 38 SOAP - Seguridad de servicios web .............................................................................................................................. 39 FORMATOS DE TIPOS DE DATOS ............................................................................................................................ 39 es / 03-90-01 Fecha: diciembre de 2020 MANUAL DE INFORMACIÓN Y DOCUMENTACIÓN EN MATERIA DE PROPIEDAD INDUSTRIAL Ref.: Normas - ST.90 página: 3.90.2 CONFORMIDAD ........................................................................................................................................................... 40 MATERIAL DE REFERENCIA ...................................................................................................................................... 41 Normas de la OMPI ........................................................................................................................................................ 41 Normas y convenciones ................................................................................................................................................. 41 API REST de las oficinas de PI ...................................................................................................................................... 43 API REST de empresas y directrices de diseño ............................................................................................................ 43 Otros ...................................................................................................................................................................... 43 ANEXOS ANEXO I - LISTA DE NORMAS DE DISEÑO Y CONVENCIONES DE SERVICIOS WEB RESTFUL ANEXO II - VOCABULARIO DE PI RELATIVO A LA ARQUITECTURA REST ANEXO III - DIRECTRICES DE LAS API WEB RESTFUL Y MODELO DE CONTRATO DE SERVICIO ANEXO IV - MEJORES PRÁCTICAS DE ARQUITECTURA DE SEGURIDAD DE ALTO NIVEL ANEXO V - CÓDIGOS DE ESTADO HTTP ANEXO VI - TÉRMINOS DE REPRESENTACIÓN ANEXO VII - PUBLICACIÓN DE LA GESTIÓN DEL CICLO DE VIDA DE LAS API es / 03-90-01 Fecha: diciembre de 2020 MANUAL DE INFORMACIÓN Y DOCUMENTACIÓN EN MATERIA DE PROPIEDAD INDUSTRIAL Ref.: Normas - ST.90 página: 3.90.3 INTRODUCCIÓN 1. En la presente norma se formulan recomendaciones sobre las interfaces de programación de aplicaciones (API) para facilitar el tratamiento y el intercambio de datos de propiedad intelectual (datos de PI) de manera armonizada a través de Internet. 2. La norma tiene como finalidad: garantizar la coherencia mediante el establecimiento de principios uniformes de diseño de servicios web; mejorar la interoperabilidad de los datos entre los socios de servicios web; fomentar la reutilización a través de un diseño unificado; promover la flexibilidad en la asignación de nombres a los datos en todas las unidades operativas por medio de una política de espacio de nombres claramente definida en los recursos de lenguaje extensible de marcado (XML) asociados; promover un intercambio de información seguro; ofrecer procesos operativos internos apropiados como servicios de valor añadido que puedan ser utilizados por otras organizaciones; e integrar sus procesos operativos internos y vincularlos dinámicamente con sus asociados institucionales. DEFINICIONES Y TERMINOLOGÍA 3. A efectos de lo previsto en la presente norma: se entenderá por "protocolo de transferencia de hipertexto (HTTP)" un protocolo de aplicación para sistemas de información distribuidos, colaborativos e hipermedia. HTTP es la base de la comunicación de datos para la World Wide Web (WWW), y funciona como un protocolo de petición-respuesta en el modelo de computación orientado al servicio; se entenderá por "interfaz de programación de aplicaciones (API)" un conjunto de componentes de software que proporcionan una interfaz reutilizable entre diferentes aplicaciones que pueden comunicarse fácilmente para intercambiar datos; se entenderá por "transferencia de estado representacional (REST)" un conjunto de principios de arquitectura en virtud
Recommended publications
  • A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments
    Proceedings on Privacy Enhancing Technologies ; 2020 (2):24–44 Zhiju Yang and Chuan Yue* A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments Abstract: Web measurement is a powerful approach to 1 Introduction studying various tracking practices that may compro- mise the privacy of millions of users. Researchers have Web tracking is frequently performed over the Internet built several measurement frameworks and performed by various trackers to collect the information of users’ a few studies to measure web tracking on the desk- browsing activities for various purposes including per- top environment. However, little is known about web sonalized advertisement, targeted attacks, and surveil- tracking on the mobile environment, and no tool is lance [12, 21, 32]. Traditionally, stateful HTTP cook- readily available for performing a comparative measure- ies are used as the dominant technique to track online ment study on mobile and desktop environments. In this users [27]. In recent years, advanced stateful tracking work, we built a framework called WTPatrol that allows techniques such as Flash cookies and advanced stateless us and other researchers to perform web tracking mea- tracking techniques such as browser or device finger- surement on both mobile and desktop environments. printing have also become very popular over the Inter- Using WTPatrol, we performed the first comparative net [1, 3, 24, 30]. User privacy has been keeping com- measurement study of web tracking on 23,310 websites promised by trackers that utilize these techniques. that have both mobile version and desktop version web- Web measurement is a powerful approach to study- pages. We conducted an in-depth comparison of the web ing online tracking practices and techniques.
    [Show full text]
  • HTTP Digest Access Authentication
    Internet Engineering Task Force (IETF) R. Shekh-Yusef, Editor Request for Comments: 7616 Avaya Obsoletes: 2617 D. Ahrens Category: Standards Track Independent ISSN: 2070-1721 S. Bremer Netzkonform September 2015 HTTP Digest Access Authentication Abstract The Hypertext Transfer Protocol (HTTP) provides a simple challenge-response authentication mechanism that may be used by a server to challenge a client request and by a client to provide authentication information. This document defines the HTTP Digest Authentication scheme that can be used with the HTTP authentication mechanism. Status of this Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 57411. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc76162. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info3) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • An Evaluation of the Webdav Extensions to the HTTP Protocol
    2000:138 MASTER'S THESIS An evaluation of the WebDAV extensions to the HTTP protocol Björn Nilsson Civilingenjörsprogrammet Institutionen för Systemteknik Avdelningen för Datorkommunikation 2000:138 • ISSN: 1402-1617 • ISRN: LTU-EX--00/138--SE An evaluation of the WebDAV extensions to the HTTP protocol Master’s Thesis in Computer Science Björn Nilsson January 2000 An evaluation of the WebDAV extensions to the HTTP protocol Abstract Abstract The HyperText Transfer Protocol (HTTP) is used for the most popular service on the Internet today – World Wide Web. WebDAV is a new extension to the HTTP protocol, which makes it possible to write, edit and share information across intranets and the Internet. In this Master’s Thesis, the WebDAV extensions are examined. A comparison between HTTP with WebDAV and the existing Internet protocols FTP and POP3 is done. Also a behavioral analysis of existing WebDAV applications is made. The conclusions are that HTTP with WebDAV extensions can replace both FTP and POP3. When using HTTP’s pipelining and persistent connections, better performance than with FTP is achieved. It seems like WebDAV can be used as a universal protocol for client-server solutions, gaining the advantages of HTTP such as encryption and caching. An evaluation of the WebDAV extensions to the HTTP protocol Preface Preface This Master’s Thesis has been made as the final part of my Master of Science degree in Computer Science and Engineering at Luleå University of Technology (LTU). The work has been carried out from September 1999 to January 2000 at Telia ProSoft AB in Malmö. I would like to thank my supervisor at Telia ProSoft, Anders Jönsson, for assistance and guidance throughout the work.
    [Show full text]
  • RFC 2617 HTTP Authentication June 1999
    Network Working Group J. Franks Request for Comments: 2617 Northwestern University Obsoletes: 2069 P. Hallam-Baker Category: Standards Track Verisign, Inc. J. Hostetler AbiSource, Inc. S. Lawrence Agranat Systems, Inc. P. Leach Microsoft Corporation A. Luotonen Netscape Communications Corporation L. Stewart Open Market, Inc. June 1999 HTTP Authentication: Basic and Digest Access Authentication Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. Abstract "HTTP/1.0", includes the specification for a Basic Access Authentication scheme. This scheme is not considered to be a secure method of user authentication (unless used in conjunction with some external secure system such as SSL [5]), as the user name and password are passed over the network as cleartext. This document also provides the specification for HTTP's authentication framework, the original Basic authentication scheme and a scheme based on cryptographic hashes, referred to as "Digest Access Authentication". It is therefore also intended to serve as a replacement for RFC 2069 [6]. Some optional elements specified by RFC 2069 have been removed from this specification due to problems found since its publication; other new elements have been added for compatibility, those new elements have been made optional, but are strongly recommended. Franks, et al. Standards Track [Page 1] RFC 2617 HTTP Authentication June 1999 Like Basic, Digest access authentication verifies that both parties to a communication know a shared secret (a password); unlike Basic, this verification can be done without sending the password in the clear, which is Basic's biggest weakness.
    [Show full text]
  • A Framework for Pervasive Web Content Delivery
    A FRAMEWORK FOR PERVASIVE WEB CONTENT DELIVERY HENRY NOVIANUS PALIT (S. Kom., ITS, Surabaya; M. Kom., UI, Jakarta) A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF COMPUTER SCIENCE SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE 2006 Acknowledgements Praise and glory be to the Lord, who has given me strength to pursue my purposes in life, courage to confront any challenge, perseverance to carry on in the midst of turbulence, and wisdom to keep me humble. He is my shepherd and my comfort; I shall not be in want. I would like to take this opportunity to express my utmost gratitude to Prof. Chi Chi Hung for his inspiration, encouragement, and invaluable advice throughout the course of my research. Not only is he the best supervisor to guide me in this research field, but outside of the research work he is also a great mentor, from whom I learn a lot about important things in life. For the time he made available for research discussions, the effort he spent on reading and revising my research papers and thesis, the help he offered when I was in trouble, and the patience he showed against my late progress, I am always thankful. I would also like to thank my replacement supervisor, Asst. Prof. Ken Sung Wing Kin, for allowing me to stay in his laboratory and for assisting me with all the administrative matters. I am sincerely grateful for his tremendous effort to help my research keep on as smoothly as possible. This study would not have been possible without the Research Scholarship I received from the National University of Singapore.
    [Show full text]
  • DEXICON Enterprise Webservice-Interface V5.2.0 10/2019
    DEXICON Enterprise Webservice-Interface V5.2.0 10/2019 DEXICON Enterprise Webservice-Interface V5.2.0 Warning and indicating symbols This warning symbol indicates hazards to your health and life (e.g. risk of coming into contact with mains voltage). You should always read and follow the text next to the symbol. This warning symbol indicates hazards that may cause damage to the device or system (malfunction, data loss, material damage, etc.) Text pointed out in this way requires you to do something. This symbol points to information that may facilitate your handling of the product or the use of this manual. DEXICON Enterprise Webservice-Interface V5.2.0 10/2019 PCS Systemtechnik GmbH Pfälzer-Wald-Str. 36, D-81539 Munich, Germany, Phone +49 - 89 - 68004-0 Home page: http://www.pcs.com Technical Support Phone: +49 - 89 - 68004-666 Fax: +49 - 89 - 68004-410 Email: [email protected] Copying this manual in whole or in parts is forbidden without the express authority of PCS Systemtechnik GmbH. The information in this manual is subject to changes so that we can maintain the state of the art at all times. PCS, INTUS, DEXICON, INTUS LBus and „PCS. The Terminal People.“ are trademarks or registered trademark of PCS Systemtechnik GmbH. All other brands and product names are trademarks or registered trademarks of the respective companies and organizations. Copyright 2019 by PCS Systemtechnik GmbH 2 10/2019 DEXICON Enterprise Webservice-Interface V5.2.0 Table of contents Warning and indicating symbols ................................................................................................... 2 1 Preface ........................................................................................................................... 7 1.1 Scope of this document .................................................................................................. 7 1.2 Additional manuals .......................................................................................................
    [Show full text]
  • Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2)
    Journal of Computer and Communications, 2017, 5, 98-111 http://www.scirp.org/journal/jcc ISSN Online: 2327-5227 ISSN Print: 2327-5219 Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2) Biljana Dimitrova, Aleksandra Mileva Faculty of Computer Science, University Goce Delčev, Štip, Republic of Macedonia How to cite this paper: Dimitrova, B. and Abstract Mileva, A. (2017) Steganography of Hyper- text Transfer Protocol Version 2 (HTTP/2). Network steganography consists of different steganographic technics that utilize Journal of Computer and Communications, network protocols for hiding data. We present nine new covert channels which 5, 98-111. utilize the new standard, HTTP/2, and which can be used regardless its trans- https://doi.org/10.4236/jcc.2017.55008 port carrier (TLS or clear TCP). These covert channels use a protocol feature Received: February 22, 2017 that has dual nature (for example, no padding can be represented in two ways); Accepted: March 28, 2017 or a feature that is not mandatory (as streams prioritization and dependencies); Published: March 31, 2017 or random value field (as PING frame payload field); or there is no strict rule Copyright © 2017 by authors and how to obtain new values for some fields (as stream identifiers). As far as we Scientific Research Publishing Inc. know, this is the first research about hiding data in HTTP/2. Also, we give a This work is licensed under the Creative small survey of existing covert channels that can be created using HTTP/1.x, Commons Attribution International License (CC BY 4.0). with the analysis do they work or not work with the HTTP/2.
    [Show full text]
  • OMA-TS-DM Protocol-V2 0-20160209-A
    OMA Device Management Protocol Approved Version 2.0 – 09 Feb 2016 Open Mobile Alliance OMA-TS-DM_Protocol-V2_0-20160209-A 2016 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document. [OMA-Template-Spec-20160101-I] OMA-TS-DM_Protocol-V2_0-20160209-A Page 2 (105) Use of this document is subject to all of the terms and conditions of the Use Agreement located at http://www.openmobilealliance.org/UseAgreement.html. Unless this document is clearly designated as an approved specification, this document is a work in process, is not an approved Open Mobile Alliance™ specification, and is subject to revision or removal without notice. You may use this document or any part of the document for internal or educational purposes only, provided you do not modify, edit or take out of context the information in this document in any manner. Information contained in this document may be used, at your sole risk, for any purposes. You may not use this document in any other manner without the prior written permission of the Open Mobile Alliance. The Open Mobile Alliance authorizes you to copy this document, provided that you retain all copyright and other proprietary notices contained in the original materials on any copies of the materials and that you comply strictly with these terms. This copyright permission does not constitute an endorsement of the products or services. The Open Mobile Alliance assumes no responsibility for errors or omissions in this document. Each Open Mobile Alliance member has agreed to use reasonable endeavors to inform the Open Mobile Alliance in a timely manner of Essential IPR as it becomes aware that the Essential IPR is related to the prepared or published specification.
    [Show full text]
  • Protecting Users from Third-Party Web Tracking with Trackingfree Browser
    I Do Not Know What You Visited Last Summer: Protecting Users from Third-party Web Tracking with TrackingFree Browser Xiang Pan Yinzhi Cao Yan Chen Northwestern University Columbia University Northwestern University [email protected] [email protected] [email protected] Abstract—Stateful third-party web tracking has drawn the neither of the approaches can completely protect users from attention of public media given its popularity among top Alexa third-party tracking: in addition to browser cookies, a tracker web sites. A tracking server can associate a unique identifier can store user’s unique identifier into many other places on from the client side with the private information contained in the client-side state, such as Flash files [4] [26] [17] and browser referer header of the request to the tracking server, thus recording caches [26] [4] [17]; meanwhile, blacklist tools highly depend the client’s behavior. Faced with the significant problem, existing on all the records in the database and a tracking company can works either disable setting tracking identifiers or blacklist third- party requests to certain servers. However, neither of them can always adopt new domains to track users. completely block stateful web tracking. To address the shortcomings of existing anti-tracking ap- In this paper, we propose TrackingFree, the first anti-tracking proaches, a third-party tracking defense system should achieve browser by mitigating unique identifiers. Instead of disabling the following goals: those unique identifiers, we isolate them into different browser Complete blocking. The system can completely block all principals so that the identifiers still exist but are not unique •existing stateful third-party tracking techniques, such as those among different web sites.
    [Show full text]
  • Swedes Online: You Are More Tracked Than You Think by Joel Purra
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Swedes Online: You Are More Tracked Than You Think by Joel Purra LIU-IDA/LITH-EX-A--15/007--SE 2015-02-19 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping This page intentionally left blank. Almost. Linköping University Department of Computer and Information Science Final Thesis Swedes Online: You Are More Tracked Than You Think by Joel Purra LIU-IDA/LITH-EX-A--15/007--SE 2015-02-19 Supervisor: Patrik Wallström The Internet Infrastructure Foundation (.SE) Supervisor: Staffan Hagnell The Internet Infrastructure Foundation (.SE) Examiner: Niklas Carlsson Division for Database and Information Techniques (ADIT) This page intentionally left blank. Almost. Master’s thesis Swedes Online: You Are More Tracked Than You Think Joel Purra [email protected], joepu444 http://joelpurra.com/ +46 70 352 1212 v1.0.0 Abstract When you are browsing websites, third-party resources record your online habits; such tracking can be considered an invasion of privacy. It was previously unknown how many third-party resources, trackers and tracker companies are present in the different classes of websites chosen: globally popular websites, random samples of .se/.dk/.com/.net domains and curated lists of websites of public interest in Sweden. The in-browser HTTP/HTTPS traffic was recorded while downloading over 150,000 websites, allowing comparison of HTTPS adoption and third-party tracking within and across the different classes of websites. The data shows that known third-party resources including known trackers are present on over 90% of most classes, that third-party hosted content such as video, scripts and fonts make up a large portion of the known trackers seen on a typical website and that tracking is just as prevalent on secure as insecure sites.
    [Show full text]
  • 2617 Northwestern University Obsoletes: 2069 P. Hallam-Baker Category: Standards Track Verisign, Inc
    Network Working Group J. Franks Request for Comments: 2617 Northwestern University Obsoletes: 2069 P. Hallam-Baker Category: Standards Track Verisign, Inc. J. Hostetler AbiSource, Inc. S. Lawrence Agranat Systems, Inc. P. Leach Microsoft Corporation A. Luotonen Netscape Communications Corporation L. Stewart Open Market, Inc. June 1999 HTTP Authentication: Basic and Digest Access Authentication Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. Abstract "HTTP/1.0", includes the specification for a Basic Access Authentication scheme. This scheme is not considered to be a secure method of user authentication (unless used in conjunction with some external secure system such as SSL [5]), as the user name and password are passed over the network as cleartext. This document also provides the specification for HTTP's authentication framework, the original Basic authentication scheme and a scheme based on cryptographic hashes, referred to as "Digest Access Authentication". It is therefore also intended to serve as a replacement for RFC 2069 [6]. Some optional elements specified by RFC 2069 have been removed from this specification due to problems found since its publication; other new elements have been added for compatibility, those new elements have been made optional, but are strongly recommended. Franks, et al. Standards Track [Page 1] RFC 2617 HTTP Authentication June 1999 Like Basic, Digest access authentication verifies that both parties to a communication know a shared secret (a password); unlike Basic, this verification can be done without sending the password in the clear, which is Basic's biggest weakness.
    [Show full text]
  • Trackingsurveillance-Draft.Pdf
    Chapter 5, Tracking and Surveillance Lorrie Faith Cranor, Manya Sleeper, Blase Ur This is the authors’ draft of a chapter that will appear in the IAPP Privacy and Information Technology text book, expected to be published in 2013. 5.1. Introduction ............................................................................................................................... 2 5.2. Internet Monitoring ................................................................................................................. 3 5.2.1. An Overview of Computer Networking ..................................................................................... 3 5.2.1.1. Packets and IP Addresses .......................................................................................................................... 3 5.2.1.2. Email ................................................................................................................................................................... 4 5.2.1.3. The HTTP and HTTPS Protocols ............................................................................................................. 4 5.2.2. Network-Scale Monitoring and Deep Packet Inspection ..................................................... 5 5.2.3. Wi-Fi Eavesdropping ....................................................................................................................... 5 5.2.4. Internet Monitoring for Employers, Schools, and Parents ................................................. 6 5.2.5. Spyware ...............................................................................................................................................
    [Show full text]