The Signature Appearance Is Only a Claim

Any name or other data, for example, marking time that appears in a document is not without anyone else necessarily any confirmation of identity etc. Data placed in the signature appearance is under control of the gathering creating the signed document In the case of Acrobat the signer can configure the appearance to be what he needs, and comparatively in MS Office the signer can provide text/designs as required. Even if such arrangement controls were not available in the application, because of the features that electronic document ordinarily have of being able to represent data in any structure that the creator requires, it would not be possible to assure that any consequently created appearance cannot be physically forged by the document signatory.

This reality does not denigrate the importance of the signature appearance in giving a means to the signatory to indicate intent when applying the signature. The very reality that the appearance is under control of the creator means that it directly represents the intent of the signatory. The signature appearance must be considered as unmistakable from the digital signature which is linked to the appearance and provides a means of verifying its authenticity.

Using Electronic Signatures

The Signature Appearance ought to be outwardly verified against the gia han chu ky so fpt

The digital signature linked to the signature appearance ought to be used to verify that the signature appearance is authentic As the digital signature is created utilizing a certified key, which is known to belong to an identified person, it very well may be used to verify the authenticity and integrity of the signed document. However, because the digital signature is invisible, and does not directly appear inside the document, it cannot be used to indicate intent through its appearance inside the document.

Verification of the signature appearance against the digital signature should be possible outwardly when reading a document by showing the signature verification data. The reader may outwardly check the verification data against the signature as it appears in the document.

Consideration had been given to the possibilities of consequently checking the signature appearance against the digital signature by the ETS1 team taking a shot at PDF Advanced Electronic Signatures principles. However, it was considered that a fraudulent signer could provide data in a manner that may mislead the verification regarding what is displayed and how this is linked to the digital signature. Hence it was decided that the surest path is to check the appearance and the verification data outwardly. Rather the human reader ought to be assisted in completing a visual examination of the verification data derived from the digital signature against the signature appearance by giving data such that the two can be easily related.