Launched: Google Wallet and U.S. mDL verification, plus Borica QES support.
Full product update
En
This Signature Creation Policy (SCP) describes the policies and procedures followed by our qualified electronic signature creation API service in creating qualified electronic signatures (QES) for our customers. This policy is in compliance with relevant laws and regulations, including but not limited to the eIDAS regulation (EU) 910/2014.
Our QES creation API service verifies the identity of the signatory through a secure and reliable identification process, which is compliant with the eIDAS regulation. This verification process follows QTSP designed or enabled steps.
Our QES creation API service creates a signature that is based on signature creation data (SCD) that is uniquely linked to the signatory and to the data being signed. The SCD includes a secure digital certificate that identifies the signatory, the cryptographic hash of the signed data, and a timestamp from a trusted time-stamping authority.
Our QES creation API service ensures that the signature creation environment is secure, and that only authorized personnel can access it. The signature creation environment includes secure hardware and software components that are tamper-evident and resistant to unauthorized access.
eID Easy uses cryptographic function according to ETSI TS 119 312 v1.4.2.
Hash functions for creation the signature can be following
Digital signature algorithms can be following
Our QES creation API service uses qualified certificates issued by a qualified trust service provider (QTSP) that is recognized by the eIDAS regulation. The qualified certificate includes the signatory’s identity and the public key that is used to verify the signature.
Signature types
eID Easy application allows creation of following levels if signatures
eID Easy following signature formats with baseline profiles baseline-B, baseline-T, baseline-LT and baseline-LTA. Qualified timestamps are acquired from SK ID Solutions (EE) and Baltstanp (LT).
These signature formats shall contain signature certificates as part of the signed data. If a hash based signatures process is used then the driving application (DA) must create a signature in a format that includes a signature in a format that protects the signing certificate within the signature from undetected replacement after the signature has been created.
If complete files to be signed are available to eID Easy then eID Easy will show to the signer preview of the documents (SD) if they are in image or PDF format and allows downloading the SD before signing. eID Easy will ensure that the data to be signed representation (DTBSR) is correctly composed by calculating DTBSR and validating the signature for errors after the signature has been completed.
What You See Is What You Sign (WYSIWYS) is achieved by rendering PDF files in the browser using open source PDF.js Javascript library. Image file preview is rendered using HTML tag. Other content types will not be rendered and can only be downloaded to see the preview.
DTBSR will be calculated after the signer has seen DTBS or SD and it signature will include signed data timestamp.
When signer proceeds to signature confirmation then a signature creation process specific to chosen QTSP will be performed.
If more than one signing certificate is available to the signer then eID Easy will either choose the default selection or allow the signer to choose the signing certificate.
Signature commitment type is by default “I accept and approve the contents on this document”. If the commitment type is different then it will be embedded in the reason or role fields and it can be shown in PAdES signature widget.
DA can choose the commitment type or let the user type in the commitment type on his own during the signature creation process.
When signature has been completed then DA can delete all temporary data and signed files immediately after downloading the signed files or have data deleted within 7 days automatically.
Our signature creation API service generates an audit trail as a separate document for non-qualified electronic signature creation activities, including the verified identity attributes of the signatory, and the timestamp of the signature. This audit trail is securely stored and is accessible only to authorized personnel.
For QES events are stored in the application logs that enable auditing of the signature creation process.
Our QES creation API service provides mechanisms for signature validation to ensure that the signature is valid, and that it has not been tampered with. The signature validation process includes verification of the SCD, the qualified certificate, and the timestamp.
Our QES creation API service follows this SCP to ensure that the QES created using our API are compliant with relevant laws and regulations, and are secure and reliable. We are committed to maintaining the highest standards of security and trustworthiness in all our services.
Effective from: 06.03.2023
Previous versions: none