incomplete - characterizes alternative approaches to e-signatures. |
This decomposition may be useful in discussing alternative solutions, but these are tightly interrelated elements and not independently addressable. However, in the implementation of e-signature systems there are several independent components that can be loosely mapped to these concepts:
Registration |
Credential |
Credential |
Signing |
Tamper |
---|---|---|---|---|
In-person proofing at USPO |
|
|
|
|
|
|
|
|
|
|
|
|
|
|