Electronic signature framework with enhanced security
First Claim
1. An electronic signature system comprising a memory device and a processor that is operatively coupled to the memory device, wherein the processor is configured to execute instructions stored in the memory device that, when executed, cause the processor to carry out an electronic signature analysis process that comprises:
- receiving, by an electronic signature server, a document verification inquiry from an authorized inquiring party, wherein the document verification inquiry includes one or more properties characterizing a document of interest;
querying document audit data stored in a storage resource managed by the electronic signature server, wherein the document audit data characterizes a plurality of documents processed by the electronic signature server;
generating query results that include document audit data characterizing at least one document having the one or more properties received with the document verification query, wherein the at least one document includes the document of interest; and
sending, to the authorized inquiring party, document audit data characterizing the document of interest, wherein the document audit data comprises a transmission report that provides a timestamp and a recipient for a transmission of the document of interest to a signatory to the document of interest;
wherein the electronic signature server does not retain the document of interest when the document verification inquiry is received.
2 Assignments
0 Petitions
Accused Products
Abstract
Improved document processing workflows provide a secure electronic signature framework by reducing attack vectors that could be used to gain unauthorized access to digital assets. In one embodiment an electronically signed document is removed from an electronic signature server after signed copies of the document are distributed to all signatories. The electronic signature server optionally retains an encrypted copy of the signed document, but does not retain the decryption password. This limits the amount of data retained by the electronic signature server, making it a less attractive target for hackers. However, the electronic signature server still maintains audit data that can be used to identify a signed document and validate an electronic signature. For example, a hash of the document (or other document metadata) can be used to validate the authenticity of an electronically signed document based on a logical association between an electronic signature and the signed document.
-
Citations
18 Claims
-
1. An electronic signature system comprising a memory device and a processor that is operatively coupled to the memory device, wherein the processor is configured to execute instructions stored in the memory device that, when executed, cause the processor to carry out an electronic signature analysis process that comprises:
-
receiving, by an electronic signature server, a document verification inquiry from an authorized inquiring party, wherein the document verification inquiry includes one or more properties characterizing a document of interest; querying document audit data stored in a storage resource managed by the electronic signature server, wherein the document audit data characterizes a plurality of documents processed by the electronic signature server; generating query results that include document audit data characterizing at least one document having the one or more properties received with the document verification query, wherein the at least one document includes the document of interest; and sending, to the authorized inquiring party, document audit data characterizing the document of interest, wherein the document audit data comprises a transmission report that provides a timestamp and a recipient for a transmission of the document of interest to a signatory to the document of interest; wherein the electronic signature server does not retain the document of interest when the document verification inquiry is received. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer readable medium comprising one or more computer-executable instructions that, when executed by one or more processors, cause a document workflow process to be carried out, the process comprising:
-
receiving, by an electronic signature server, an electronically signed document; generating a hash of the electronically signed document that is received by the electronic signature server; storing the hash of the electronically signed document in a long-term storage resource managed by the electronic signature server; removing the received electronically signed document from the electronic signature server; after removing the electronically signed document from the electronic signature server, receiving, by the electronic signature server, a document verification inquiry from an authorized inquiring party, wherein the document verification inquiry identifies a document of unknown authenticity; generating a hash of the document of unknown authenticity; matching the hash of the document of unknown authenticity with the hash of the electronically signed document; and sending, to the authorized inquiring party, document audit data characterizing an electronic signature that was applied to the electronically signed document, wherein the document audit data includes a transmission report that provides a timestamp and a recipient for an electronic mail containing the electronically signed document. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented electronic signature acquisition method comprising:
-
receiving, by an electronic signature server, an electronically signed document; generating a hash of the electronically signed document that is received by the electronic signature server; storing the hash of the electronically signed document in a long-term storage resource managed by the electronic signature server; removing the received electronically signed document from the electronic signature server; after removing the electronically signed document from the electronic signature server, receiving, by the electronic signature server, a document verification inquiry from an authorized inquiring party, wherein the document verification inquiry identifies a document of unknown authenticity; generating a hash of the document of unknown authenticity; matching the hash of the document of unknown authenticity with the hash of the electronically signed document; and sending, to the authorized inquiring party, document audit data characterizing an electronic signature that was applied to the electronically signed document, wherein the document audit data includes a transmission report that provides a timestamp and a recipient for a transmission of the electronically signed document to a signatory to the electronically signed document. - View Dependent Claims (15, 16, 17, 18)
-
Specification