It is created using electronic signature creation data that the signatory can, with a high level of confidence, use under his sole control
The user identity is linked to the device of the user, while the private keys are also generated and stored only in that device and are protected by PIN-codes that are set by the user.