Global Information Lookup Global Information

Secure signature creation device information


A secure signature creation device (SSCD) is a specific type of computer hardware or software that is used in creating an electronic signature. To be put into service as a secure signature creation device, the device must meet the rigorous requirements laid out under Annex II of Regulation (EU) No 910/2014 (eIDAS), where it is referred to as a qualified (electronic) signature creation device (QSCD). Using secure signature creation devices helps in facilitating online business processes that save time and money with transactions made within the public and private sectors.[1][2] [3]

  1. ^ Turner, Dawn M. "What is a secure signature creation device". Cryptomathic. Retrieved 18 November 2016.
  2. ^ Turner, Dawn. "Understanding eIDAS". Cryptomathic. Retrieved 12 April 2016.
  3. ^ "Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC". EUR-Lex. The European Parliament and the Council of the European Union. Retrieved 18 March 2016.

and 26 Related for: Secure signature creation device information

Request time (Page generated in 0.8594 seconds.)

Secure signature creation device

Last Update:

A secure signature creation device (SSCD) is a specific type of computer hardware or software that is used in creating an electronic signature. To be put...

Word Count : 834

Electronic signature

Last Update:

level of a qualified electronic signature. By requiring the use of a qualified electronic signature creation device and being based on a certificate...

Word Count : 4203

Qualified electronic signature

Last Update:

created by a qualified signature creation device (QSCD). For an electronic signature to be considered as a qualified electronic signature, it must meet three...

Word Count : 1084

Electronic Signatures Directive

Last Update:

advanced electronic signatures which are based on a qualified certificate and which are created by a secure-signature-creation device: (a) satisfy the legal...

Word Count : 416

Digital signature in Estonia

Last Update:

with the strictest requirements (advanced electronic signature, secure-signature-creation device, qualified certificate, certification-service-provider...

Word Count : 676

ZertES

Last Update:

signature generation and issues Signaturprüfschlüssel (signature verification keys) to qualified certificates. The secure signature creative device must...

Word Count : 882

CEN Workshop Agreement

Last Update:

link] (March 2004): secure signature creation devices. Other CWA deals with e-signature; among them: CWA 14170 Signature Creation Process and Environment...

Word Count : 168

Mobile signature

Last Update:

real-word identity. By doing a signature, the secure device owner can claim that identity. Thus, the mobile signature is a unique feature for: Proving...

Word Count : 2307

Code signing

Last Update:

used to authenticate the code signature should be traceable back to a trusted root authority CA, preferably using a secure public key infrastructure (PKI)...

Word Count : 2632

Public key certificate

Last Update:

electronic signatures (which require using a qualified trust service provider and signature creation device) are given the same power as a physical signature. In...

Word Count : 4444

Trusted execution environment

Last Update:

trusted applications running on the device than a rich operating system (OS) and more functionality than a 'secure element' (SE). The Open Mobile Terminal...

Word Count : 3212

Public key infrastructure

Last Update:

secret key—methods; Mobile signatures are electronic signatures that are created using a mobile device and rely on signature or certification services...

Word Count : 4068

Encryption

Last Update:

the time of creation is only secure if the encryption device itself has correct keys and has not been tampered with. If an endpoint device has been configured...

Word Count : 3575

UEFI

Last Update:

acceptable digital signature. The mechanical details of how precisely these drivers are to be signed are not specified. When Secure Boot is enabled, it...

Word Count : 9773

Trusted timestamping

Last Update:

Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. Security here means that no one—not...

Word Count : 1285

Pretty Good Privacy

Last Update:

recent) OpenPGP specification, trust signatures can be used to support creation of certificate authorities. A trust signature indicates both that the key belongs...

Word Count : 5724

Computer security

Last Update:

digitally secure telecommunication device is the SIM (Subscriber Identity Module) card, a device that is embedded in most of the world's cellular devices before...

Word Count : 22144

EIDAS

Last Update:

electronic signature creation device based on a qualified certificate for electronic signatures. Qualified digital certificate for electronic signature, a certificate...

Word Count : 2301

Junos OS

Last Update:

operating system used in Juniper Networks routing, switching and security devices. Junos OS was first made available on 7 July 1998. As of 2008, feature...

Word Count : 1179

Cipher suite

Last Update:

The use of ciphers has been a part of the Secure Socket Layer (SSL) transit protocol since its creation. SSL has been succeeded by TLS for most uses...

Word Count : 2358

History of cryptography

Last Update:

1960s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a...

Word Count : 6651

WebAuthn

Last Update:

user accounts (possibly at initial account creation time but more likely when adding a new security device to an existing account) while the get() method...

Word Count : 2855

Authentication

Last Update:

to copy attempts and can be authenticated with a smartphone. A secure key storage device can be used for authentication in consumer electronics, network...

Word Count : 3811

Mobile security

Last Update:

also create a multitude of files, which can lead to the creation of viruses. Android mobile devices are prone to Trojan-droppers. The banking Trojans also...

Word Count : 10983

Quantum cryptography

Last Update:

the devices. Since then, several problems have been shown to admit unconditional secure and device-independent protocols, even when the actual devices performing...

Word Count : 8931

Electronic authentication

Last Update:

that involves either a digital signature of the claimant or is acquired directly by a trusted third party through a secure authentication protocol. Triggered...

Word Count : 4320

PDF Search Engine © AllGlobal.net