ABSTRACT

During the signature-verifi cation process it should be ensured with reasonable certainty that: (a) the data used for verifying the signature correspond to the data displayed to the

verifi er;

(b) the signature is reliably verifi ed and the result of that verifi cation is correctly displayed;

(c) the verifi er can, as necessary, reliably establish the contents of the signed data:

(d) the authenticity and validity of the certifi cate required at the time of signature verifi cation are reliably verifi ed;

(e) the result of verifi cation and the signatory’s identity are correctly displayed;

(f) the use of a pseudonym is clearly indicated; and

(g) any security-relevant changes can be detected.