A secure signature creation device (SSCD) is a specific type of computer hardware or software that is used in creating an electronic signature. To be put into service as a secure signature creation device, the device must meet the rigorous requirements laid out under Annex II of Regulation (EU) No 910/2014 (eIDAS), where it is referred to as a qualified (electronic) signature creation device (QSCD). Using secure signature creation devices helps in facilitating online business processes that save time and money with transactions made within the public and private sectors.[1][2][3]
^Turner, Dawn M. "What is a secure signature creation device". Cryptomathic. Retrieved 18 November 2016.
^Turner, Dawn. "Understanding eIDAS". Cryptomathic. Retrieved 12 April 2016.
^"Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC". EUR-Lex. The European Parliament and the Council of the European Union. Retrieved 18 March 2016.
and 26 Related for: Secure signature creation device information
A securesignaturecreationdevice (SSCD) is a specific type of computer hardware or software that is used in creating an electronic signature. To be put...
created by a qualified signaturecreationdevice (QSCD). For an electronic signature to be considered as a qualified electronic signature, it must meet three...
advanced electronic signatures which are based on a qualified certificate and which are created by a secure-signature-creationdevice: (a) satisfy the legal...
link] (March 2004): securesignaturecreationdevices. Other CWA deals with e-signature; among them: CWA 14170 SignatureCreation Process and Environment...
real-word identity. By doing a signature, the securedevice owner can claim that identity. Thus, the mobile signature is a unique feature for: Proving...
used to authenticate the code signature should be traceable back to a trusted root authority CA, preferably using a secure public key infrastructure (PKI)...
electronic signatures (which require using a qualified trust service provider and signaturecreationdevice) are given the same power as a physical signature. In...
trusted applications running on the device than a rich operating system (OS) and more functionality than a 'secure element' (SE). The Open Mobile Terminal...
secret key—methods; Mobile signatures are electronic signatures that are created using a mobile device and rely on signature or certification services...
the time of creation is only secure if the encryption device itself has correct keys and has not been tampered with. If an endpoint device has been configured...
acceptable digital signature. The mechanical details of how precisely these drivers are to be signed are not specified. When Secure Boot is enabled, it...
Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one—not...
recent) OpenPGP specification, trust signatures can be used to support creation of certificate authorities. A trust signature indicates both that the key belongs...
digitally secure telecommunication device is the SIM (Subscriber Identity Module) card, a device that is embedded in most of the world's cellular devices before...
electronic signaturecreationdevice based on a qualified certificate for electronic signatures. Qualified digital certificate for electronic signature, a certificate...
operating system used in Juniper Networks routing, switching and security devices. Junos OS was first made available on 7 July 1998. As of 2008, feature...
The use of ciphers has been a part of the Secure Socket Layer (SSL) transit protocol since its creation. SSL has been succeeded by TLS for most uses...
1960s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a...
user accounts (possibly at initial account creation time but more likely when adding a new security device to an existing account) while the get() method...
to copy attempts and can be authenticated with a smartphone. A secure key storage device can be used for authentication in consumer electronics, network...
also create a multitude of files, which can lead to the creation of viruses. Android mobile devices are prone to Trojan-droppers. The banking Trojans also...
the devices. Since then, several problems have been shown to admit unconditional secure and device-independent protocols, even when the actual devices performing...
that involves either a digital signature of the claimant or is acquired directly by a trusted third party through a secure authentication protocol. Triggered...