Digitally signing a document
First Claim
Patent Images
1. An apparatus comprising:
- a processor;
a memory that stores code executable by the processor to;
monitor for a trigger;
determine whether a digital document contains a user signature in response to the trigger;
apply a cryptographic digital signature to the digital document in response to the digital document including a user signature, wherein the cryptographic digital signature comprises information associated with the digital document that demonstrates the authenticity of the digital document;
detect one or more edits by a user associated with the user signature to the digital document after the cryptographic digital signature is applied to the digital document;
determine whether the one or more edits were made within a predetermined time period of application of the cryptographic digital signature;
determine, in response to determining that the one or more edits were made within a predetermined time period, whether the one or more edits satisfy at least one criterion comprising one of;
an amount of editing, a type of edit, and a same application session;
automatically reapply the cryptographic digital signature to the digital document without requiring the user to apply a second user signature in response to determining that the one or more edits satisfy at least one criterion;
require the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to the one or more edits not satisfying at least one criterion; and
require the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to determining that the one or more edits were not made within a predetermined time period.
2 Assignments
0 Petitions
Accused Products
Abstract
For digitally signing a document, an apparatus, method, and computer program product are disclosed. The apparatus includes a processor and a memory that stores code, executable by the processor, including code that: detects a trigger, searches a digital document for a user signature in response to the trigger, and applies a digital signature to the digital document in response to the digital document including a user signature. In some embodiments, the digital signature may be based on the user signature.
18 Citations
20 Claims
-
1. An apparatus comprising:
-
a processor; a memory that stores code executable by the processor to; monitor for a trigger; determine whether a digital document contains a user signature in response to the trigger; apply a cryptographic digital signature to the digital document in response to the digital document including a user signature, wherein the cryptographic digital signature comprises information associated with the digital document that demonstrates the authenticity of the digital document; detect one or more edits by a user associated with the user signature to the digital document after the cryptographic digital signature is applied to the digital document; determine whether the one or more edits were made within a predetermined time period of application of the cryptographic digital signature; determine, in response to determining that the one or more edits were made within a predetermined time period, whether the one or more edits satisfy at least one criterion comprising one of;
an amount of editing, a type of edit, and a same application session;automatically reapply the cryptographic digital signature to the digital document without requiring the user to apply a second user signature in response to determining that the one or more edits satisfy at least one criterion; require the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to the one or more edits not satisfying at least one criterion; and require the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to determining that the one or more edits were not made within a predetermined time period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving a trigger; determining, by use of a processor, whether a digital document contains a user credential in response to receiving the trigger; applying a cryptographic digital signature to the digital document, the cryptographic digital signature based on the user credential, the cryptographic digital signature comprising information associated with the digital document that demonstrates the authenticity of the digital document; detecting one or more edits by a user associated with the user signature to the digital document after the cryptographic digital signature is applied to the digital document; determining whether the one or more edits were made within a predetermined time period of application of the cryptographic digital signature; determining, in response to determining that the one or more edits were made within a predetermined time period, whether the one or more edits satisfy at least one criterion comprising one of;
an amount of editing, a type of edit, and a same application session;automatically reapplying the cryptographic digital signature to the digital document without requiring the user to apply a second user signature in response to determining that the one or more edits satisfy at least one criterion; requiring the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to the one or more edits not satisfying at least one criterion; and requiring the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to determining that the one or more edits were not made within a predetermined time period. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A program product comprising a non-transitory computer readable storage medium that stores code executable by a processor, the executable code comprising code to perform:
-
detecting a trigger; determining whether a digital document contains a user signature in response to the trigger; verifying the user signature in response to the digital document including a user signature; applying a cryptographic digital signature to the digital document, the cryptographic digital signature based on the user signature, wherein the cryptographic digital signature comprise information associated with the digital document that demonstrates the authenticity of the digital document; detecting one or more edits by a user associated with the user signature to the digital document after the cryptographic digital signature is applied to the digital document; determining whether the one or more edits were made within a predetermined time period of application of the cryptographic digital signature; determining, in response to determining that the one or more edits were made within a predetermined time period, whether the one or more edits satisfy at least one criterion comprising one of;
an amount of editing, a type of edit, and a same application session;automatically reapplying the cryptographic digital signature to the digital document without requiring the user to apply a second user signature in response to determining that the one or more edits satisfy at least one criterion; requiring the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to the one or more edits not satisfying at least one criterion; and requiring the user making the one or more edits to apply a second user signature before reapplying the cryptographic digital signature to the digital document in response to determining that the one or more edits were not made within a predetermined time period. - View Dependent Claims (20)
-
Specification