A-Z Popular New Study Guide Search »
Information Science
 
Related Guides
Digital Preservation

Documents

Information Culture

Information Things

11 Examples of Non-repudiation

 , updated on
Non-repudiation is the ability to prove or disprove that something happened such as a financial transaction or a binding signature on a legal agreement. This has its roots in legal processes intended to prevent entities from claiming they didn't agree to something or sign a document. In its modern form, non-repudiation is both a legal and technology concern. The following are illustrative examples of non-repudiation.

Receipts

A receipt with a unique transaction identifier that proves that a sale occurred.

Signatures

Signatures on documents are a traditional form of non-repudiation.

Seals & Stamps

Another traditional form of non-repudiation are seals and stamps such as Japanese hanko and inkan that are used to provide non-repudiation of documents, transactions and communications.

Notary Services

It is common for the signing of legal documents to be witnessed by a licensed notary. The notary ensures that the signature is authentic and not made under the undue influence of a third party.

Forensic Science

A handwriting expert may be used by a legal service as a means of non-repudiation of signatures.

Authentication

A user is authenticated according to multiple factors before performing a financial translation on a banking website. This makes it more difficult for the user to dispute a transaction such as a stock trade.

Audit Trail

A financial website maintains a detailed record of each page visited including information such as IP addresses. This information can be used in digital forensics to prove the authenticity of a user action.

Digital Signatures

A ecommerce retailer accepts invoices from a supplier electronically using an integration interface. The interface authenticates the partner by confirming that they can decrypt a message that was encrypted using the public key found in the partner's digital certificate. This involves sending an encrypted hashcode and requiring the partner to decrypt it and send it back. An audit trail is created that includes the unique hashcode that was decrypted by the partner. The only way that the partner can realistically claim the transaction didn't happen to to claim their private key was compromised.

Blockchain

Blockchain is a distributed ledger technology that provides non-repudiation with tamper-proof records of transactions.

Biometric Authentication

Biometric authentication makes it difficult to claim that it wasn't you who used a device or accessed a location.

Surveillance

Surveillance cameras and other surveillance such as voice recordings can be used as a type of non-repudiation that can be used as proof that an individual took some action such as entering into a purchase agreement.

Notes

Non-repudiation relies on the state of security surrounding authentication, authorization and transaction records. For example, if technologies existed that could easily simulate your biometric identity, this would no longer be a strong form of non-repudiation.
Overview: Non-repudiation
Type
Definition
The ability to prove or disprove that something happened such as a financial transaction or legally binding signature.
Value
A cornerstone of law, commerce and information security.
Related Concepts
Next: Audit Trail
More about information security:
Ambiguity
Artifact
Confidential Information
Data
Digitization
Documents
Filter Bubble
Information Analysis
Information Culture
Information Flow
Information Literacy
Information Management
Information Quality
Information Security
Information Sources
IT Examples
Knowledge
Namespace
Non-repudiation
Opinion
Permalink
Privacy
Written Records
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Types of Technology

A reasonably comprehensive list of information technologies.

Gamification

A list of gamification techniques.

Information Technology Problems

A list of common IT problems.

Types Of Cloud

The basic types of cloud computing.

Machine Data

The common types of machine data.

Types Of Software

The common types of software.

Proprietary Technology

A definition of proprietary technology with examples.

Systems Design

The common elements of a systems design.

Systems vs Applications

The difference between systems and applications explained.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map