ABSTRACT
During the signature-verifi cation process it should be ensured with reasonable certainty that: (a) the data used for verifying the signature correspond to the data displayed to the
verifi er;
(b) the signature is reliably verifi ed and the result of that verifi cation is correctly displayed;
(c) the verifi er can, as necessary, reliably establish the contents of the signed data:
(d) the authenticity and validity of the certifi cate required at the time of signature verifi cation are reliably verifi ed;
(e) the result of verifi cation and the signatory’s identity are correctly displayed;
(f) the use of a pseudonym is clearly indicated; and
(g) any security-relevant changes can be detected.