Digital signature authentication enables electronic records to be validated using asymmetric cryptography and hash functions transforming the original record. A subscriber may authenticate an electronic record by affixing a digital signature; authentication is effected by the use of an asymmetric crypto system and hash function that envelop and transform the initial electronic record into another electronic record.
Cases where this provision is explicitly mentioned in the judgment/order text; may not be exhaustive. To view the complete list of cases mentioning this section, Click here.
Provisions expressly mentioned in the judgment/order text.
Digital signature authentication enables electronic records to be validated using asymmetric cryptography and hash functions transforming the original record.
A subscriber may authenticate an electronic record by affixing a digital signature; authentication is effected by the use of an asymmetric crypto system and hash function that envelop and transform the initial electronic record into another electronic record.
Full Summary is available for active users!
Note: It is a system-generated summary and is for quick reference only.