Current location - Quotes Website - Signature design - How to embody the legal effect of electronic signature?
How to embody the legal effect of electronic signature?
Electronic signature is an application of electronic signature technology, which uses image processing technology to transform electronic signature operation into the same visual effect as paper document stamping operation. Electronic signature technology is used to ensure the authenticity and integrity of electronic documents and the non-repudiation of signers.

Examples of Reliable Electronic Signatures (Source: Electronic Signatures)

According to Article 14 of the Electronic Signature Law, a reliable electronic signature has the same legal effect as a traditional signature or seal. The legal effect of electronic signature needs to comply with the legal provisions of "reliable electronic signature".

According to Article 13 of the Electronic Signature Law, an electronic signature shall be regarded as reliable if it meets the following conditions at the same time:

(1) When the electronic signature production data is used for electronic signature, it belongs to the exclusive rights of the electronic signer; (true identity)

(2) When signing, the electronic signature production data is controlled by the electronic signer; (true will)

(3) Any changes to the electronic signature after signature can be found; (Signature unchanged)

(4) Any changes to the content and form of the data message after signature can be found. (Original text unchanged)

Electronic signature method

Therefore, if an electronic signature/seal can prove its true identity and true will, and the document or signature can be found after being tampered with, then it is a reliable electronic signature with the same legal effect as the traditional signature/seal.

Among them, true identity and true will are confirmed by identity authentication and will authentication; The signature and original text have not been changed, and it is realized by electronic signature technology such as digital certificate, time stamp and encryption algorithm.

Electronic signature signing process (source: electronic signature)

1. Real identity: Before using electronic signature, users need to ensure that their online and offline identities are consistent. After face recognition, bank and other four elements of authentication, a digital certificate representing the network identity will be issued, which can only be authenticated by oneself.

② True will: After authentication, each user has an independent digital certificate. Every signature requires the user to do signature confirmation actions, such as face brushing, SMS verification, password signature and so on.

Example of identity authentication process (source: e-sign treasure)

③ and ④ The original text has not been changed, and the signature has not been changed: RSA, SM2, SHA 256, SM3 and other cryptographic algorithms are comprehensively applied, which conforms to PADES standards, and time stamps are introduced to ensure the content and time of the signature to be solidified, so as to achieve the purpose of anti-tampering of the original text and the signature.