...
In the design of e-signature systems there are several independent components, each of which present choices among technical alternatives, and these choices can be mapped to our requirements:
Ease-of-use | Portability | Cost to | Accountability | Registration | Credential | Credential | Signing | Tamper | Fails: complex and mysterious | Fails: reader required | Fails: cost of person-proofing and certificate issuance | Strong confidence in identity and credential, however, custody of credential not guaranteed
| Ease-of-use | Portability | Cost | Accountability |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
In-person proofing at USPO | PKI private key | In-person | Digital Signature: document hash is encrypted with private key. Requires some type of reader to input the key, and, client software to execute the hashing and encrypting | Store signed document and digital signature |
| Fails: complex and mysterious | Fails: reader required | Fails: cost of person-proofing and certificate issuance | Strong confidence in identity and credential, however, custody of credential not guaranteed | |||||||
|
|
|
|
|
|
|
|
|
| |||||||
|
|
|
|
|
|
|
|
|
|