...
In the design of e-signature systems there are several independent components, each of which present choices among technical alternatives, and these choices can be mapped to our requirements:
Design | Registration | Credential | Credential | Signing | Tamper |
| Ease-of-use | Portability | Cost | Accountability |
---|---|---|---|---|---|---|---|---|---|---|
| In-person proofing at USPO | PKI private key | In-person | Digital Signature: document hash is encrypted with private key. Requires some type of reader to input the key, and, client software to execute the hashing and encrypting | Store signed document and digital signature |
| Fails: complex and mysterious | Fails: reader required | Fails: cost of person-proofing and certificate issuance | Strong confidence in identity and credential, however, custody of credential not guaranteed |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|