WO2002059728A2 - Method and system for obtaining digital signatures - Google Patents
Method and system for obtaining digital signatures Download PDFInfo
- Publication number
- WO2002059728A2 WO2002059728A2 PCT/US2001/048290 US0148290W WO02059728A2 WO 2002059728 A2 WO2002059728 A2 WO 2002059728A2 US 0148290 W US0148290 W US 0148290W WO 02059728 A2 WO02059728 A2 WO 02059728A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- signed
- user
- authorized
- recited
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 33
- 238000010200 validation analysis Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 3
- 102100023441 Centromere protein J Human genes 0.000 description 12
- 101000907924 Homo sapiens Centromere protein J Proteins 0.000 description 12
- 238000012550 audit Methods 0.000 description 8
- 238000013475 authorization Methods 0.000 description 8
- 230000008520 organization Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 239000008186 active pharmaceutical agent Substances 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009118 appropriate response Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/02—Digital computers in general; Data processing equipment in general manually operated with input through keyboard and computation using a built-in program, e.g. pocket calculators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/68—Special signature format, e.g. XML format
Definitions
- the present disclosure relates generally to digital signatures, and in particular, to a
- Encryption is one of the most commonly utilized methods of securing the contents of
- ciphertext unintelligible form referred to as ciphertext.
- the algorithms used in encryption can be defined
- a sender Using symmetric private key encryption, a sender encrypts data using a private key.
- Public key encryption is an asymmetrical encryption method involving the use of key
- Each key pair includes a public key and a private key.
- the holder of the private key can be
- the key can decrypt the data using the public key.
- holders of the public key can encrypt data using the public key.
- the encrypted data can then be safely forwarded to the holder of the
- public key is published in a public key file or embedded in a certificate.
- Public key encryption provides increased security over private key encryption, since a
- Public key encryption also allows a
- the sender encrypts the data using
- the recipient decrypts the data using the
- a sender can provide a further level of protection.
- a sender can
- Digital signatures may also be formed using other methods.
- data can be
- a one-way hash function digested (hashed) into a single block using a one-way hash function.
- the digest can than be encrypted with the
- the resulting encrypted digest can then be appended to the encrypted or
- unencrypted data (encrypted using recipient's public key) as a signature.
- the recipient decrypts the digest using the sender's public key.
- the recipient also digests (hashes)
- the senders's signature can be verified. This type of digital signature provides verification
- a Certification Authority provides such a trusted
- a CA issues public key certificates. Each certificate typically contains the user's name
- certificates bind a user's name to the public key and are signed by a trusted issuer (e.g., the CA).
- the certificate is signed by an authority of the CA prior to distribution.
- Attribute certificates provide a further degree of protection. Attribute certificates certify a
- the attribute certificates include, in addition to information identifying the public key
- the information may include a monetary limit for the
- each employee is assigned their own
- receiver of the signed document is then required to verify that the signer's certificate has not
- a certificate may be revoked by placing it on a certificate revocation list (CRL).
- CTL certificate revocation list
- a digital signature system comprises a database holding access control rules that identify
- each signature capable of receiving signature requests from a plurality of authorized users, each signature
- the signing system parses the document to be signed
- the access control rules may identify at least one of a type and attribute of documents
- each user is authorized to have signed and the signing system may parse the document to be
- the request may further include user authentication information unique to the requesting
- the signing system authenticates the user via the user authentication information
- infomiation may comprise a digital certificate, with co ⁇ esponding public and private keys.
- digital certificate may comprise an X-509 certificate.
- the system may further comprise an email interface, wherein the signature request is in
- infomiation may comprise a user's email address.
- the signing system may authenticate the user
- a method of digitally signing documents using a signing system is also disclosed.
- Infomiation obtained by the parsing is compared to the stored access control rules to determine
- Fig. 1 is a block diagram of a signing system according to an embodiment
- Fig. 2 A is a block diagram and Fig. 2B is a functional diagram of a signing system
- Fig. 3 is a flow chart for describing a method of providing digital signatures according to
- Fig. 4 is a functional diagram of a digital signature system according to another
- Fig. 5 is flow chart for describing a method of providing digital signatures according to
- Fig. 6 is a table for describing the types of information stored in a database according to
- Fig. 7 is a lable for describing the types of information stored in a database according to
- Fig. 8 is a block diagram for describing a digital certification authority according to an
- Fig. 9 is a chart showing an audit log according to an embodiment.
- Fig. 10 is an example of an email used according to an embodiment.
- FIG. 1 A system for signing documents according to an embodiment is shown in Fig. 1.
- system includes a signing system 100 for electronically signing documents using a certificate or
- At least one signature requestor 102a-102n is authorized by signing
- Each requestor 102a-102n each requestor 102a-102n
- signing system 100 may submit a request to have any document they like signed. However, signing system 100 will
- requestor will prepare a request to have a document signed and forward the request along with
- signing system 100 will parse the document to determine
- Document parsing involves breaking a document into tokens or words, using lexical
- an XML document may be broken down into start tags, end tags,
- An XML invoice for example, may be characterized by a set of valid
- the signing system When parsing a document, the signing system will determine if
- a document is a valid XML document, for example. If a valid XML document, it will then
- the system determine if it is a valid XML invoice.
- the invoice might be classified as an "Invoice Under $2,500".
- Signing system 100 compares the document's type and attributes to the information
- signing system 100 signs the
- Fig 2A shows the system in block diagram form
- Fig 2B show s the system in functional form.
- the signing system according to this specification
- DSS document signing server
- SAS secure audit server
- DSS 2 document ⁇ ahdation server (DNS) 6.
- DSS 2 is refe ⁇ ed to collectively
- signing system 1 each is provided on a network 9, as shown in Fig. 2A. As shown
- SAS 4 and DNS 6 each include a secure application program interface (API)
- network 9 is described as a local area network (LAN) in this embodiment, it
- network 9 may instead be a wide area network (WAN) or other type of WAN
- servers 2-6 are examples of networks such as the Internet, for example.
- networks such as the Internet, for example.
- LAN may be provided on a separate secure LAN which is connected to one or more LANs or the
- each server 2-6 may include a modem or other type of
- the network 9 may
- te ⁇ ninal 5, 7 may consist of a personal computer (PC), for example.
- PC personal computer
- GUIs graphical user interfaces
- Each administrator workstation or te ⁇ ninal 5 may include one or more GUIs 26
- each requestor 8a-8n represents an employee of company X.
- requestors
- Signing system 1 includes a signing policy database 14 which defines the type and/or
- requestor 8a-8n can request that signing system 1 sign any document they like.
- a requestor 8a can prepare a request for a document to be signed, using
- the request including the document to be signed, can
- DSS 2 will parse the document to determine its type and attributes and may classify the
- DSS 2 will retrieve the types and
- DSS 2 compares the
- DSS 2 will sign the document using a
- Requestor 8a can then forward
- the signed document to the recipient as is, or by further enclosing the signed document in an
- requestor 8a when preparing the request can include the recipients email address, for example, and request that the signed document be delivered directly to the end recipient by DSS
- DSS 2 after DSS 2 signs the document. DSS 2 can then forward the signed document directly to the
- CA certificate authority
- the system's signing policies are stored in signing policy database
- policies define, for example, whom is allowed to have
- policies may limit the specific type of documents signed. For example, the policies may limit the specific type of documents signed.
- policies may also define document attributes for identifying the attributes of
- policies may set quote
- Signing Policy GUI 11 allows one or more authorized administrators 12a-12n access to
- Figure 6 depicts an example of the types of information that may be stored in database
- each employee has an authorization limit and a purchase type
- FIG. 6 only depicts one department of Company X
- database 14 may store information for each employee of the company authorized to sign
- each employee will only be allowed to have documents signed which have total
- database may include infomiation identifying other document types and attributes.
- document validation GUI 23 may be used by a requestor 8 to
- request signing system 1 to validate a signed document. That is, if a requestor 8 receives a signed document.
- the requestor can forward the signed document to signing system 1 to have it
- DVS 6 is responsible for validating signed documents in response to the request.
- DVS 6 will parse the document, determine the type and attributes of the document, determine
- SAS 4 maintains logs of all transactions
- Requestors 8 may request infomiation about
- SAS 4 is capable of reviewing and searching its logs
- the logs can be digitally signed and tamper-proof so that unauthorized parties do
- each employee is provided with PK1 infrastructure (PK1) system.
- PK1 infrastructure
- a requestor 8a for example, prepares a request to DSS 2 using
- signature request GUI 17 may prompt the requestor for
- the request may, for example, be a request that a
- Step S22 forwards the signed request to DSS 2 (Step S22) and forwards the signed request to DSS 2 (Step S22).
- DSS 2 retrieves the requestor's public key from database
- Step S26 If the request does not authenticate (No, Step S28),
- Step S30 notification is provided to the requestor that their request did not authenticate (Step S30) and the process ends.
- SAS 4 may also be notified at this time that the request did not authenticate, so
- Step S28 DSS 2 parses the document to be signed to determine its type and attributes
- DSS 2 compares the document's type and attributes to the authorization limits of the
- Step S32 the procedure
- Step S34 DSS 2 signs the document using its own
- Step S3S The signed document is then returned to the requestor or
- SAS 4 may also be
- recipient as is. or can further package it (e.g., in an electronic envelope) using their private key
- the document may be authenticated using
- Fig. 4 depicts another embodiment in which each employee
- 30a-30n is identified and authenticated by their e-mail address (32a-32n).
- An employee prepares an email request such as that in Fig. 10.
- the email request includes a "DATE" field
- the email request also includes a
- the "TO" field is the email address of the DSS 42.
- the "SUBJECT" field of the email may include a
- a message field "MESSAGE" can be a message for providing additional
- infomiation to DSS 42 including, for example, a request that the email be forwarded directly to
- the document to be signed is attached to the email as a file attachment.
- DSS 42 After receipt of the email, DSS 42 parses the "SUBJECT" field of the email, recognizes it
- DSS 42 also parses the
- DSS 42 determines if the employee is authorized to have the requested document signed. If the
- the DSS 42 signs the document using the system's private signing key
- DSS 42 then prepares an email, attaching the signed document and forwards the signed
- the signed document can be emailed back to the recipient at the recipient's email address.
- the request was to return the signed document to the employee requestor, the signed document can be emailed back to the
- employee's email address as indicated in the "FROM" field of the request.
- the employee may
- Fig. 5 is a flowchart describing overall operation of the system shown in Fig. 4.
- an employee prepares an email requesting DSS 42 to sign a document.
- the email may
- the email is forwarded by the employee to
- DSS 42 by directing it to a unique email address associated with DSS 42 (Step S62).
- DSS 42 compares the requestor's email address as shown in the "FROM" field of the
- the database includes the
- SAS 44 may also be notified that authorization was denied, logging
- Step S74 type and attributes to the authorized document type and attributes for the employee as retrieved from database 31 to determine if the employee is authorized to have the document
- Step S78 Notification may also be provided to SAS 44.
- Notification may also be provided to SAS 44.
- Step S76 DSS 42 signs the document using its
- DSS 42 can then prepare an e-mail to the employee or the recipient (Step S80).
- the employee is responsible for fonvarding the
- Fig. 4 may be implemented in one system. In this way. the system
- the employee may still have access to a terminal including the appropriate GUIs, the employee may still have
- Fig. 8 depicts a system for providing digital certificates to organizations, companies etc.
- Digital certification authority 86 acts as a certificate
- Each company ' s X509 certificate (80, 82, 84) is stored in directory 88 of digital
- a certificate revocation list 90 is also provided at digital certificate
- Each company X, Y and Z has a contract or agreement with digital certificate
- the recipient may then open the signed document.
- administrators 12 may each be provided with an X509
- signing system 1 (not shown) can be provided in signing system 1 which indicates the level of access each
- an administrator has to areas of the system. For example, an administrator may be given access to
- the secure audit server 18 and be denied access to DVS 8 and DSS 2, while another
- GUIs for use by the administrators may include a document type GUI 15.
- GUI 15 displays a list
- predefined document classes e.g., text, HTML, XML, CSN, etc.
- each class having a number of predefined document classes (e.g., text, HTML, XML, CSN, etc.), each class having a number
- An administrator 12 may create a document type by selecting a document class and specifying the name of the document type.
- the attributes associated with the document may be created by selecting a document class and specifying the name of the document type.
- the administrator may also specify whether particular attributes
- the administrator can instmct signing system 1 to create
- the administrators may also use a secure audit GUI 13 which provides the
- SAS 4 may also maintain an archive of all documents signed by the system.
- Fig. 9 shows an
- the audit log sheet can be compiled by the administrator by date, by
- requestor name by document ID or by document type, for example, and retrieved.
- transaction log as shown in Fig. 9 may include the name of the party requesting an action, the
- infomiation may also be logged.
- the email request Message-Id, etc. may be logged for periodic review or
- the database can be arranged to include documents which the requestors are not allowed
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2003-7009672A KR20030071843A (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining digital signatures |
IL15671701A IL156717A0 (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining digital signatures |
EP01991070A EP1354259A2 (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining digital signatures |
BR0116815-0A BR0116815A (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining digital signatures |
AU2002230823A AU2002230823B2 (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining digital signatures |
JP2002559991A JP2004531918A (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining a digital signature |
CA002433154A CA2433154A1 (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining digital signatures |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/767,398 | 2001-01-23 | ||
US09/767,398 US7039807B2 (en) | 2001-01-23 | 2001-01-23 | Method and system for obtaining digital signatures |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002059728A2 true WO2002059728A2 (en) | 2002-08-01 |
WO2002059728A3 WO2002059728A3 (en) | 2003-05-22 |
Family
ID=25079353
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/048290 WO2002059728A2 (en) | 2001-01-23 | 2001-12-10 | Method and system for obtaining digital signatures |
Country Status (11)
Country | Link |
---|---|
US (2) | US7039807B2 (en) |
EP (1) | EP1354259A2 (en) |
JP (1) | JP2004531918A (en) |
KR (1) | KR20030071843A (en) |
CN (1) | CN1503932A (en) |
AU (1) | AU2002230823B2 (en) |
BR (1) | BR0116815A (en) |
CA (1) | CA2433154A1 (en) |
IL (1) | IL156717A0 (en) |
WO (1) | WO2002059728A2 (en) |
ZA (1) | ZA200305084B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004031923A1 (en) * | 2002-10-07 | 2004-04-15 | Axalto Sa | Signature creation device |
GB2406187A (en) * | 2003-09-19 | 2005-03-23 | Fujitsu Ltd | Granting use of an electronic signature |
DE102004031446A1 (en) * | 2004-06-29 | 2006-01-26 | Secardeo Gmbh | Authorizing method for digital signatures in portable document format (PDF) documents stores authorizing data in a PDF document for checking signatures |
WO2007030488A1 (en) * | 2005-09-09 | 2007-03-15 | Microsoft Corporation | Directed signature workflow |
Families Citing this family (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7543018B2 (en) * | 1996-04-11 | 2009-06-02 | Aol Llc, A Delaware Limited Liability Company | Caching signatures |
US20020147904A1 (en) * | 2001-04-10 | 2002-10-10 | Moritaka Nakamura | Electronic notarization on net system |
US7325249B2 (en) | 2001-04-30 | 2008-01-29 | Aol Llc | Identifying unwanted electronic messages |
JP2003069559A (en) * | 2001-08-23 | 2003-03-07 | Sony Corp | Content protection system |
US8904270B2 (en) * | 2006-11-29 | 2014-12-02 | Omtool Ltd. | Methods and apparatus for enterprise document distribution |
US8732566B2 (en) * | 2006-11-29 | 2014-05-20 | Omtool, Ltd. | Methods and apparatus for digital content handling |
US8726015B2 (en) * | 2001-10-29 | 2014-05-13 | Omtool, Ltd. | Methods and apparatus for secure content routing |
US7496604B2 (en) * | 2001-12-03 | 2009-02-24 | Aol Llc | Reducing duplication of files on a network |
US7870089B1 (en) * | 2001-12-03 | 2011-01-11 | Aol Inc. | Reducing duplication of embedded resources on a network |
EP1343286A1 (en) * | 2002-03-04 | 2003-09-10 | BRITISH TELECOMMUNICATIONS public limited company | Lightweight authentication of information |
US20030188180A1 (en) * | 2002-03-28 | 2003-10-02 | Overney Gregor T. | Secure file verification station for ensuring data integrity |
US20040158733A1 (en) | 2003-02-11 | 2004-08-12 | Thaddeus Bouchard | Method and system for secure facsimile delivery and registration |
US7590695B2 (en) | 2003-05-09 | 2009-09-15 | Aol Llc | Managing electronic messages |
US7739602B2 (en) | 2003-06-24 | 2010-06-15 | Aol Inc. | System and method for community centric resource sharing based on a publishing subscription model |
US7451321B2 (en) * | 2003-10-07 | 2008-11-11 | Joseph Ernest Dryer | Electronic signature management method |
US7694143B2 (en) * | 2003-11-18 | 2010-04-06 | Oracle International Corporation | Method of and system for collecting an electronic signature for an electronic record stored in a database |
US7966493B2 (en) * | 2003-11-18 | 2011-06-21 | Oracle International Corporation | Method of and system for determining if an electronic signature is necessary in order to commit a transaction to a database |
US7650512B2 (en) * | 2003-11-18 | 2010-01-19 | Oracle International Corporation | Method of and system for searching unstructured data stored in a database |
US8782020B2 (en) * | 2003-11-18 | 2014-07-15 | Oracle International Corporation | Method of and system for committing a transaction to database |
US20050108211A1 (en) * | 2003-11-18 | 2005-05-19 | Oracle International Corporation, A California Corporation | Method of and system for creating queries that operate on unstructured data stored in a database |
US7600124B2 (en) * | 2003-11-18 | 2009-10-06 | Oracle International Corporation | Method of and system for associating an electronic signature with an electronic record |
WO2005055516A1 (en) * | 2003-11-28 | 2005-06-16 | Telecom Italia S.P.A. | Method and apparatus for data certification by a plurality of users using a single key pair |
US7533407B2 (en) | 2003-12-16 | 2009-05-12 | Microsoft Corporation | System and methods for providing network quarantine |
CA2457478A1 (en) * | 2004-02-12 | 2005-08-12 | Opersys Inc. | System and method for warranting electronic mail using a hybrid public key encryption scheme |
FR2867001B1 (en) * | 2004-02-27 | 2006-06-16 | Gemplus Card Int | METHOD FOR PRODUCING A DIGITAL CERTIFICATE, DIGITAL CERTIFICATE THEREOF, AND METHOD FOR USING SUCH A DIGITAL CERTIFICATE |
US20050231738A1 (en) * | 2004-03-10 | 2005-10-20 | Elynx, Ltd. | Electronic document management system |
EP1577730A1 (en) | 2004-03-17 | 2005-09-21 | Sap Ag | Method, system and software application for verifying certain requirements on electronic documents |
US20050267954A1 (en) * | 2004-04-27 | 2005-12-01 | Microsoft Corporation | System and methods for providing network quarantine |
US20060157559A1 (en) * | 2004-07-07 | 2006-07-20 | Levy Kenneth L | Systems and methods for document verification |
US7707642B1 (en) | 2004-08-31 | 2010-04-27 | Adobe Systems Incorporated | Document access auditing |
US20060085850A1 (en) * | 2004-10-14 | 2006-04-20 | Microsoft Corporation | System and methods for providing network quarantine using IPsec |
US7886144B2 (en) * | 2004-10-29 | 2011-02-08 | Research In Motion Limited | System and method for retrieving certificates associated with senders of digitally signed messages |
JP5437548B2 (en) * | 2004-11-15 | 2014-03-12 | ハイデルベルガー ドルツクマシーネン アクチエンゲゼルシヤフト | Input signatures in electronic control systems |
US7568104B2 (en) * | 2005-01-19 | 2009-07-28 | International Business Machines Corporation | Method and apparatus for adding signature information to electronic documents |
US8560853B2 (en) * | 2005-09-09 | 2013-10-15 | Microsoft Corporation | Digital signing policy |
US20070079139A1 (en) * | 2005-09-30 | 2007-04-05 | Dynasig Corporation | Signature authentication |
US7526677B2 (en) * | 2005-10-31 | 2009-04-28 | Microsoft Corporation | Fragility handling |
US20070136209A1 (en) * | 2005-12-06 | 2007-06-14 | Shabbir Khan | Digital object title authentication |
US7827545B2 (en) * | 2005-12-15 | 2010-11-02 | Microsoft Corporation | Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy |
US20070198525A1 (en) * | 2006-02-13 | 2007-08-23 | Microsoft Corporation | Computer system with update-based quarantine |
US7793096B2 (en) * | 2006-03-31 | 2010-09-07 | Microsoft Corporation | Network access protection |
US7975143B2 (en) * | 2006-06-12 | 2011-07-05 | International Business Machines Corporation | Method, system, and program product for generating and validating digital signatures |
US7995568B2 (en) * | 2006-06-12 | 2011-08-09 | International Business Machines Corporation | Capturing user interface switch states |
US8572751B2 (en) * | 2006-06-12 | 2013-10-29 | International Business Machines Corporation | Method, system, and program product for preventing unauthorized changes to an electronic document |
US9514117B2 (en) | 2007-02-28 | 2016-12-06 | Docusign, Inc. | System and method for document tagging templates |
US20080215588A1 (en) * | 2007-03-02 | 2008-09-04 | Toshiba Europe Gmbh | Electronic object sharing system |
US7904389B2 (en) * | 2007-05-30 | 2011-03-08 | Visa U.S.A. Inc. | Real time account update |
US8949706B2 (en) | 2007-07-18 | 2015-02-03 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US8655961B2 (en) * | 2007-07-18 | 2014-02-18 | Docusign, Inc. | Systems and methods for distributed electronic signature documents |
US8910234B2 (en) * | 2007-08-21 | 2014-12-09 | Schneider Electric It Corporation | System and method for enforcing network device provisioning policy |
US8166118B1 (en) | 2007-10-26 | 2012-04-24 | Sendside Networks Inc. | Secure communication architecture, protocols, and methods |
US9225684B2 (en) * | 2007-10-29 | 2015-12-29 | Microsoft Technology Licensing, Llc | Controlling network access |
US7849213B1 (en) | 2007-10-30 | 2010-12-07 | Sendside Networks, Inc. | Secure communication architecture, protocols, and methods |
US7827246B2 (en) * | 2008-03-14 | 2010-11-02 | International Business Machines Corporation | Dynamic domain based electronic mail signature lines |
US8126819B1 (en) | 2008-03-14 | 2012-02-28 | Happy Lawn of America, Inc. | Online lawn care estimate process |
KR101007521B1 (en) * | 2008-07-23 | 2011-01-18 | (주)에스알파트너즈 | Document authentication system using electronic signature of licensee and document authentication method thereof |
US8706622B2 (en) * | 2008-08-05 | 2014-04-22 | Visa U.S.A. Inc. | Account holder demand account update |
JP5320895B2 (en) * | 2008-08-07 | 2013-10-23 | 富士通株式会社 | Information search method and information search apparatus |
BRPI0902945A2 (en) * | 2009-03-12 | 2010-11-23 | Sergio Leal Fonseca | mobile electronic document signer |
US8484723B2 (en) | 2009-06-05 | 2013-07-09 | Signix, Inc. | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer |
US9251131B2 (en) | 2010-05-04 | 2016-02-02 | Docusign, Inc. | Systems and methods for distributed electronic signature documents including version control |
SG10201504580YA (en) | 2010-06-11 | 2015-07-30 | Docusign Inc | Web-based electronically signed documents |
CN101883106A (en) * | 2010-06-30 | 2010-11-10 | 赛尔网络有限公司 | Network access authentication method and server based on digital certificate |
US8874923B2 (en) * | 2012-07-24 | 2014-10-28 | Adobe Systems Incorporated | Policy-based signature authentication system and method |
FI20105866A0 (en) * | 2010-08-20 | 2010-08-20 | Signom Oy | Service to electronically sign documents |
CN103917999B (en) | 2011-07-14 | 2017-10-24 | 多塞股份公司 | On-line signature identity and verification method and its system in community |
US9268758B2 (en) | 2011-07-14 | 2016-02-23 | Docusign, Inc. | Method for associating third party content with online document signing |
US9824198B2 (en) | 2011-07-14 | 2017-11-21 | Docusign, Inc. | System and method for identity and reputation score based on transaction history |
US10511732B2 (en) | 2011-08-25 | 2019-12-17 | Docusign, Inc. | Mobile solution for importing and signing third-party electronic signature documents |
EP2748721B1 (en) | 2011-08-25 | 2022-10-05 | DocuSign, Inc. | Mobile solution for signing and retaining third-party documents |
US9230130B2 (en) | 2012-03-22 | 2016-01-05 | Docusign, Inc. | System and method for rules-based control of custody of electronic signature transactions |
WO2013170371A1 (en) * | 2012-05-18 | 2013-11-21 | Chg Hospital Beds Inc. | Patient support with data communication |
US20140115713A1 (en) * | 2012-10-23 | 2014-04-24 | Adobe Systems Incorporated | Providing electronic signature services to third party applications based on api calls |
US9866391B1 (en) * | 2013-01-30 | 2018-01-09 | Amazon Technologies, Inc. | Permissions based communication |
US20150143256A1 (en) * | 2013-11-20 | 2015-05-21 | Memoreze LLC | Interface for Interaction with a Compendium by Members of a Group |
US9747460B1 (en) * | 2014-01-17 | 2017-08-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for data sharing and transaction processing for high security documents |
US10032133B2 (en) * | 2014-01-24 | 2018-07-24 | Adobe Systems Incorporated | Automatically identifying authorized signatories from an organization for executing an electronic document |
US9411971B2 (en) * | 2014-12-09 | 2016-08-09 | Adobe Systems Incorporated | Automatically preventing unauthorized signatories from executing electronic documents for organizations |
JP6503242B2 (en) * | 2015-06-26 | 2019-04-17 | ルネサスエレクトロニクス株式会社 | Apparatus, system and method for providing data security and program for causing a computer to execute the method |
CN106096434B (en) * | 2016-05-30 | 2019-07-19 | 武汉开目信息技术有限责任公司 | A kind of electronic document signature method |
CN107846281B (en) * | 2017-10-30 | 2020-12-08 | 上海应用技术大学 | Proxy multiple signature method and system based on position |
US20190296918A1 (en) * | 2018-03-23 | 2019-09-26 | Proofshow Inc. | Method and system for issuing proof-equipped certificates for certificate authority |
US11444779B2 (en) | 2018-08-02 | 2022-09-13 | Paypal, Inc. | Techniques for securing application programming interface requests using multi-party digital signatures |
US11146404B2 (en) * | 2018-11-02 | 2021-10-12 | Bank Of America Corporation | Shared ecosystem for electronic document signing and sharing (DSS) |
CN109831308B (en) * | 2019-02-27 | 2022-10-04 | 上海棕榈电脑系统有限公司 | Digital signature authentication method, storage medium, and device |
US11301845B2 (en) * | 2019-08-19 | 2022-04-12 | Anchor Labs, Inc. | Cryptoasset custodial system with proof-of-stake blockchain support |
US11494763B2 (en) * | 2019-08-19 | 2022-11-08 | Anchor Labs, Inc. | Cryptoasset custodial system with custom logic |
EP3920069A1 (en) * | 2020-06-02 | 2021-12-08 | Penneo A/S | A computer-implemented method of providing at least one electronic signature for a plurality of electronic documents and data processing device or system for the same |
JP7018485B2 (en) * | 2020-07-22 | 2022-02-10 | 弁護士ドットコム株式会社 | Electronic contract program, information processing equipment and information processing method |
CN113612603B (en) * | 2021-07-28 | 2023-10-27 | 上海第二工业大学 | Unauthorized strong assignment verifier signcryption method |
US20240070380A1 (en) * | 2022-08-31 | 2024-02-29 | Docusign, Inc. | Dynamic implementation of document management system capabilities in third party integrations |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0387462A1 (en) * | 1989-03-14 | 1990-09-19 | International Business Machines Corporation | Electronic document approval system |
WO1996002993A2 (en) * | 1994-07-19 | 1996-02-01 | Bankers Trust Company | Method for securely using digital signatures in a commercial cryptographic system |
WO2000057318A1 (en) * | 1999-03-18 | 2000-09-28 | Rdm Corporation | Method and system for processing electronic documents |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4965763A (en) * | 1987-03-03 | 1990-10-23 | International Business Machines Corporation | Computer method for automatic extraction of commonly specified information from business correspondence |
US5005200A (en) * | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5214702A (en) * | 1988-02-12 | 1993-05-25 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4868877A (en) * | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5999711A (en) * | 1994-07-18 | 1999-12-07 | Microsoft Corporation | Method and system for providing certificates holding authentication and authorization information for users/machines |
US5646997A (en) * | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US5794177A (en) * | 1995-07-19 | 1998-08-11 | Inso Corporation | Method and apparatus for morphological analysis and generation of natural language text |
US5787175A (en) * | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
US5774552A (en) * | 1995-12-13 | 1998-06-30 | Ncr Corporation | Method and apparatus for retrieving X.509 certificates from an X.500 directory |
FR2747257B1 (en) * | 1996-04-09 | 1998-09-11 | Gilbert Henri | IDENTIFICATION AND / OR SIGNATURE PROCESS |
US5742769A (en) * | 1996-05-06 | 1998-04-21 | Banyan Systems, Inc. | Directory with options for access to and display of email addresses |
US6006332A (en) * | 1996-10-21 | 1999-12-21 | Case Western Reserve University | Rights management system for digital media |
US6021491A (en) * | 1996-11-27 | 2000-02-01 | Sun Microsystems, Inc. | Digital signatures for data streams and data archives |
US5960085A (en) * | 1997-04-14 | 1999-09-28 | De La Huerga; Carlos | Security badge for automated access control and secure data gathering |
US6021419A (en) * | 1997-09-16 | 2000-02-01 | International Business Machines Corporation | System for filtering broadcast digital information in accordance with channel identifiers stored in preference list which can be dynamically updated via command through network |
KR100241350B1 (en) * | 1997-10-27 | 2000-02-01 | 정선종 | Electronic certificate paper generation method |
US6073242A (en) * | 1998-03-19 | 2000-06-06 | Agorics, Inc. | Electronic authority server |
US7039805B1 (en) * | 1998-05-20 | 2006-05-02 | Messing John H | Electronic signature method |
US6584466B1 (en) * | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
US6671805B1 (en) * | 1999-06-17 | 2003-12-30 | Ilumin Corporation | System and method for document-driven processing of digitally-signed electronic documents |
AU4460600A (en) * | 1999-04-13 | 2000-11-14 | Ilumin Corporation | Collaborative creation, editing, reviewing, and signing of electronic documents |
US6826690B1 (en) * | 1999-11-08 | 2004-11-30 | International Business Machines Corporation | Using device certificates for automated authentication of communicating devices |
US7237114B1 (en) * | 2000-04-26 | 2007-06-26 | Pronvest, Inc. | Method and system for signing and authenticating electronic documents |
US7210037B2 (en) * | 2000-12-15 | 2007-04-24 | Oracle International Corp. | Method and apparatus for delegating digital signatures to a signature server |
US20020078140A1 (en) * | 2000-12-19 | 2002-06-20 | Ciaran Kelly | Remote web page maintenance |
AU2003255146A1 (en) | 2003-07-18 | 2005-02-04 | Opt Engineering Co., Ltd. | Continuous riveter and method of continuously caulking blind rivets |
-
2001
- 2001-01-23 US US09/767,398 patent/US7039807B2/en not_active Expired - Lifetime
- 2001-12-10 KR KR10-2003-7009672A patent/KR20030071843A/en not_active Application Discontinuation
- 2001-12-10 BR BR0116815-0A patent/BR0116815A/en not_active Withdrawn
- 2001-12-10 CA CA002433154A patent/CA2433154A1/en not_active Abandoned
- 2001-12-10 AU AU2002230823A patent/AU2002230823B2/en not_active Ceased
- 2001-12-10 JP JP2002559991A patent/JP2004531918A/en not_active Abandoned
- 2001-12-10 CN CNA018222226A patent/CN1503932A/en active Pending
- 2001-12-10 WO PCT/US2001/048290 patent/WO2002059728A2/en not_active Application Discontinuation
- 2001-12-10 EP EP01991070A patent/EP1354259A2/en not_active Ceased
- 2001-12-10 IL IL15671701A patent/IL156717A0/en unknown
-
2003
- 2003-06-30 ZA ZA200305084A patent/ZA200305084B/en unknown
-
2006
- 2006-04-28 US US11/380,720 patent/US8103867B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0387462A1 (en) * | 1989-03-14 | 1990-09-19 | International Business Machines Corporation | Electronic document approval system |
WO1996002993A2 (en) * | 1994-07-19 | 1996-02-01 | Bankers Trust Company | Method for securely using digital signatures in a commercial cryptographic system |
WO2000057318A1 (en) * | 1999-03-18 | 2000-09-28 | Rdm Corporation | Method and system for processing electronic documents |
Non-Patent Citations (2)
Title |
---|
MENDES S ET AL: "A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust model" NETWORK AND DISTRIBUTED SYSTEM SECURITY, 1995., PROCEEDINGS OF THE SYMPOSIUM ON SAN DIEGO, CA, USA 16-17 FEB. 1995, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, 16 February 1995 (1995-02-16), pages 172-189, XP010134529 ISBN: 0-8186-7027-4 * |
RUSSELL S: "AUDIT-BY-RECEIVER PARADIGMS FOR VERIFICATION OF AUTHORIZATION AT SOURCE OF ELECTRONIC DOCUMENTS" COMPUTERS & SECURITY. INTERNATIONAL JOURNAL DEVOTED TO THE STUDY OF TECHNICAL AND FINANCIAL ASPECTS OF COMPUTER SECURITY, ELSEVIER SCIENCE PUBLISHERS. AMSTERDAM, NL, vol. 13, no. 1, 1 February 1994 (1994-02-01), pages 59-67, XP000430128 ISSN: 0167-4048 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004031923A1 (en) * | 2002-10-07 | 2004-04-15 | Axalto Sa | Signature creation device |
GB2406187A (en) * | 2003-09-19 | 2005-03-23 | Fujitsu Ltd | Granting use of an electronic signature |
GB2429312A (en) * | 2003-09-19 | 2007-02-21 | Fujitsu Ltd | Device for providing a secret key to an electronic signature creating unit |
GB2429312B (en) * | 2003-09-19 | 2007-08-01 | Fujitsu Ltd | Device for providing a secret key |
GB2406187B (en) * | 2003-09-19 | 2007-09-12 | Fujitsu Ltd | Method of and apparatus for granting electronic signature,and computer program |
US7513411B2 (en) | 2003-09-19 | 2009-04-07 | Fujitsu Limited | Method of and apparatus for granting electronic signature, and computer program |
DE102004031446A1 (en) * | 2004-06-29 | 2006-01-26 | Secardeo Gmbh | Authorizing method for digital signatures in portable document format (PDF) documents stores authorizing data in a PDF document for checking signatures |
DE102004031446B4 (en) * | 2004-06-29 | 2006-10-26 | Secardeo Gmbh | Method for authorizing digital signatures in PDF documents |
WO2007030488A1 (en) * | 2005-09-09 | 2007-03-15 | Microsoft Corporation | Directed signature workflow |
US8819440B2 (en) | 2005-09-09 | 2014-08-26 | Microsoft Corporation | Directed signature workflow |
Also Published As
Publication number | Publication date |
---|---|
US20020099938A1 (en) | 2002-07-25 |
US8103867B2 (en) | 2012-01-24 |
AU2002230823B2 (en) | 2008-08-07 |
BR0116815A (en) | 2005-04-12 |
WO2002059728A3 (en) | 2003-05-22 |
CN1503932A (en) | 2004-06-09 |
ZA200305084B (en) | 2004-06-30 |
CA2433154A1 (en) | 2002-08-01 |
EP1354259A2 (en) | 2003-10-22 |
US20060190734A1 (en) | 2006-08-24 |
US7039807B2 (en) | 2006-05-02 |
KR20030071843A (en) | 2003-09-06 |
IL156717A0 (en) | 2004-01-04 |
JP2004531918A (en) | 2004-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7039807B2 (en) | Method and system for obtaining digital signatures | |
AU2002230823A1 (en) | Method and system for obtaining digital signatures | |
US5774552A (en) | Method and apparatus for retrieving X.509 certificates from an X.500 directory | |
US6199052B1 (en) | Secure electronic transactions using a trusted intermediary with archive and verification request services | |
Kuhn et al. | Sp 800-32. introduction to public key technology and the federal pki infrastructure | |
US6145079A (en) | Secure electronic transactions using a trusted intermediary to perform electronic services | |
US7644268B2 (en) | Automated electronic messaging encryption system | |
US5745574A (en) | Security infrastructure for electronic transactions | |
US8656166B2 (en) | Storage and authentication of data transactions | |
US20010037453A1 (en) | Secure electronic transactions using a trusted intermediary with non-repudiation of receipt and contents of message | |
EP0869637A2 (en) | Digital certification system | |
KR19990044692A (en) | Document authentication system and method | |
US20070288746A1 (en) | Method of providing key containers | |
Jøsang et al. | PKI seeks a trusting relationship | |
Ford | A public key infrastructure for us government unclassified but sensitive applications | |
Patriciu et al. | Design aspects in a public key infrastructure for network applications security | |
Hughes | Interoperability and Usability—Key Requirements in the Deployment of Enterprise Secure E-mail | |
Dridi et al. | Managing Security in the World Wide Web: Architecture, Services and Techniques | |
Gluck | Protection of Electronic Mail and Electronic Messages: Challenges andSolutions | |
López | Overview of Technologies Supporting Security Requirements in 21 CFR Part 11 Part II | |
Spinellis et al. | Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions | |
Berbecaru et al. | Digital Certificates and Public-Key Infrastructures | |
JP2006511984A (en) | System and method for electronic transmission, storage and retrieval of certified documents | |
Tjøstheim | A critical view on public key infrastructures | |
Hughes | Pro Active Directory Certificate Services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2433154 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002230823 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001991070 Country of ref document: EP Ref document number: 2003/05084 Country of ref document: ZA Ref document number: 156717 Country of ref document: IL Ref document number: 200305084 Country of ref document: ZA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 01023/DELNP/2003 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020037009672 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 018222226 Country of ref document: CN Ref document number: 2002559991 Country of ref document: JP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020037009672 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2001991070 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWR | Wipo information: refused in national office |
Ref document number: 2001991070 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2001991070 Country of ref document: EP |