×

Duress signatures

  • US 10,110,385 B1
  • Filed: 12/22/2014
  • Issued: 10/23/2018
  • Est. Priority Date: 12/22/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,receiving a signature of a signatory, wherein the signatory is associated with a first set of credential data and a second set of credential data, wherein the first set of credential data is associated with a first duress level, and wherein the second set of credential data is associated with a second duress level;

    receiving a document identifier for identifying a document, the document identifier derived based at least in part from document contents;

    obtaining an identity verification identifier for identifying an identity verification token, wherein the identity verification token is registered with an identity registrar and authorized by the identity registrar to generate signatures, and wherein the identity verification identifier comprises a first private key corresponding to a first public key and a second private key corresponding to a second public key;

    generating a first signature based at least in part on the document identifier, the first set of credential data, and the identity verification identifier, wherein the first signature is based at least in part on encrypting the document identifier using the first private key;

    determining that the generated first signature is not a match to the received signature of the signatory;

    generating a second signature based at least in part on the document identifier, the second set of credential data, and the identity verification identifier, wherein the second signature is based at least in part on encrypting the document identifier using the second private key;

    determining that the generated second signature is a match to the received signature of the signatory; and

    performing an action in accordance with the second duress level, wherein the action is one or more of hiding information associated with a first account, displaying information associated with a second account, notifying security personnel of a security incident indicated by the second duress level, sending a message indicating an occurrence of the second duress level, indicating the occurrence of the second duress level in a data store, or repudiating transactions associated with the document.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×