Image Bank-Grade Security

More Than Just an Image of a Digitized Signature

A signature captured with SIGNificant is much more than just an electronic image of a digitized signature. We record the handwritten signature of a person using all available parameters, such as acceleration, speed, and rhythm. These parameters are unique to every individual and cannot be reproduced by a forger. Thus the digitized signature is forensically identifiable.

Image

Forensic Signature Verification

When someone claims “I didn’t sign that,” a forensic expert can perform a deep manual signature verification any time afterwards, using the SIGNificant PenAnalyst software just as they would with a signature on paper. In addition to this service, we also provide a signature verification that authenticates a signature against a pre-enrolled signature profile database in real time.

Learn More
Image

Encryption of the Biometrical Signature Data

The biometrical signature data is encrypted asymmetrically using a public key directly while the signature is being recorded. Reading the signature for verification purposes is only possible by decrypting it with the corresponding private key, which can either be stored offline, e.g. at a notary, or when required online, for example in a High Security Module (HSM).

Image
Image

Secure Communication with Signature Pads

To prevent sniffing of the captured biometric data from the signature tablet, our security mechanisms range from encrypting the communication between the signature pad and the computer to an end-to-end encryption of the signature data on the pad itself.

Binding the Signature to the Document

The signature is always securely bound to a unique document. The document's fingerprint is encrypted together with the signature data, making copy/paste attacks impossible.

Image
Image

Browse the Document on Signature Pads

We show the relevant part of the document as the background image on signature pads, to provide the signer a visual link between the signature and the document. On many signature pads we enable signers to browse through the whole document on the signature pad if they want to. Although the displays are typically not very large, this works quite well.

Trusted Timestamp and Geolocation

You can integrate nearly any time-stamp service you want to proof the exact signature date and increase legal compliance. In addition to this capability we embed the geolocation into the signature data if available. 

Image

Prove the Signer's Identity for Online Transactions

When capturing a forensically identifiable signature is not an option, you can choose different authentication methods for online transactions. Options range from email-only authentication, to leveraging trusted authentication models that you have already in place, to using a Facebook login, up to sending a text message with a one-time password to a signer’s mobile phone.

Image

Get a Detailed Audit Trail

The audit trail is a powerful tool that can prove who signed a document and when they signed it. Our Audittrail keeps track of the following events and more:

  • Emails and notifications sent
  • Signer's consent to use e-signatures
  • User authentication provided
  • Pages viewed by each signer
  • Signature creation
  • Transaction completion
  • Document downloads
  • Cancellations

Image

Tamper Evidence

Every time a signature is captured, a digital signature is also applied, which turns the document into a sealed PDF, making undetectable changes of the document content impossible. As a result, documents are tamper-evident not just at the end of the signing process, but from the moment the transaction is started.

Image

True Digital Signatures

Our signatures are true digital signatures based on documented technical standards that are not proprietary to xyzmo. SIGNificant-signed documents can be easily verified using free PDF reader software. There’s no need to go to our website for that.

Image

View Document History

By using true digital signatures we record a history of what each document looked like at the time it was signed. The history is embedded into the document. You can take a look at the embedded signature history within compliant PDF viewers, even if you're not connected to the internet. In this way, you can see exactly how the document looked when each signer signed it.

Image

The entire team is ready to assist you with automation of business processes to improve service and cost by fully digitizing such processes. Contact us through your local partner IconUK.

Why not visit our Blog site for related articles.

Sign Anywhere, Anytime, on Any-device. Faster, Cheaper and Better.