Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Scribd will begin operating the SlideShare business on September 24, 2020 As of this date, Scribd will manage your SlideShare account and any content you may have on SlideShare, and Scribd's General Terms of Use and Privacy Policy will apply. If you wish to opt out, please close your SlideShare account. Learn more.
Published on
Electronic Seal is a new solution incorporated in the eIDAS EU Regulation. Using the Electronic Seal to secure evidence of electronic transactions can facilitate the implementation of electronic services for individuals, reducing the need for them to use the electronic signature.
Electronic Seal is designed to ensure the integrity and authenticity of documents sealed with it. The Seal certificate contains information, which defines what exactly does “the authenticity” of the document imply. Authenticity of an electronic document may mean that the sealed document has been created or processed in accordance with rules regulated by certificate or certification policy.
The eIDAS Regulation specifies that only a legal person can create a seal. The creation of an electronic seal guarantees the authenticity of the document in accordance with the terms of use of the electronic seal, which are defined in the certificate or certification policy.
The above scheme allows for the creation of technical solutions, in which the seal mechanism can become a part of a device provided or authorized by "creator of a seal". These devices create an electronic seal over electronic data processed by them. The seal can contain information on the processing schema and security conditions. Individuals or legal persons for specific dedicated tasks can then use such devices. The evidence prepared by such a device can secure a business process or other trust services.
Be the first to comment