Electronic contracts esign ueta
Download
1 / 20

- PowerPoint PPT Presentation


  • 210 Views
  • Updated On :

Electronic Contracts- eSign & UETA. Copyright, Peter S. Vogel, 2004-2008. Federal e-Sign Act (2000). S. 761 -Electronic Signatures in Global and National Commerce Act Effective October 2000 Permits the use of digital signature for authentication of transactions

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about '' - tilly


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Electronic contracts esign ueta l.jpg

Electronic Contracts-eSign & UETA

Copyright, Peter S. Vogel, 2004-2008


Federal e sign act 2000 l.jpg
Federale-SignAct(2000)

  • S. 761 -Electronic Signatures in Global and National Commerce Act

  • Effective October 2000

  • Permits the use of digital signature for authentication of transactions

  • Empowers the use of online contracting and provision of notices


Texas ueta l.jpg
TexasUETA

  • SB 393 -Uniform Electronic Transactions Act

  • Effective January 1, 2002

  • Applies only to transactions between parties each of which has agreed to conduct transactions by electronic means.

  • Whether the parties agree to conduct a transaction by electronic means is determined from the context and surrounding circumstances, including the parties' conduct.






Http www dir state tx us standards srrpub13 approved list of cas htm l.jpg
http://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htmhttp://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htm


Entrust com l.jpg
Entrust.comhttp://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htm


Entrust terms and conditions of use l.jpg
Entrust- Terms and Conditions of Usehttp://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htm


Verisign l.jpg
Verisignhttp://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htm


Aba 1996 l.jpg
ABA 1996http://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htm


Slide16 l.jpg

The Figure below describes the process of digital signature creation. To sign a document or any other item of information, the signer first delimits precisely the borders of what is to be signed. The delimited information to be signed is termed the ‘message’ in these Guidelines. Then a hash function in the signer’s software computes a hash result unique (for all practical purposes) to the message. The signer’s software then transforms the hash result into a digital signature using the signer’s private key. The resulting digital signature is thus unique to both the message and the private key used to create it.

Digital signature verification


Slide17 l.jpg

Verification of a digital signature creation. To sign a document or any other item of information, the signer first delimits precisely the borders of what is to be signed. The delimited information to be signed is termed the ‘message’ in these Guidelines. Then a hash function in the signer’s software computes a hash result unique (for all practical purposes) to the message. The signer’s software then transforms the hash result into a digital signature using the signer’s private key. The resulting digital signature is thus unique to both the message and the private key used to create it.

Verification of a digital signature, as illustrated in below, is accomplished by computing a new hash result of the original message by means of the same hash function used to create the digital signature. Then, using the public key and the new hash result, the verifier checks: (1) whether the digital signature was created using the corresponding private key; and (2) whether the newly computed hash result matches the original hash result which was transformed into the digital signature during the signing process. The verification software will confirm the digital signature as “verified” if: (1) the signer’s private key was used to digitally sign the message, which is known to be the case if the signer’s public key was used to verify the signature because the signer's public key will verify only a digital signature created with the signer's private key; and (2) the message was unaltered, which is known to be the case if the hash result computed by the verifier is identical to the hash result extracted


Slide18 l.jpg

Judicial Committee on Information Technology (JCIT) creation. To sign a document or any other item of information, the signer first delimits precisely the borders of what is to be signed. The delimited information to be signed is termed the ‘message’ in these Guidelines. Then a hash function in the signer’s software computes a hash result unique (for all practical purposes) to the message. The signer’s software then transforms the hash result into a digital signature using the signer’s private key. The resulting digital signature is thus unique to both the message and the private key used to create it.


ad