WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:   || 2 |

«NAMIRIAL GmbH Legal Office: Seilerstätte 16, 1010 Wien, Austria Main Office: Haider Straße 23, 4025 Ansfelden | Phone: +43-7229-88060 | ...»

-- [ Page 1 ] --

Remote e-Signing via the Web

Send and Sign Documents Online. Anywhere.

Anytime. On Any Device.

NAMIRIAL GmbH

Legal Office: Seilerstätte 16, 1010 Wien, Austria

Main Office: Haider Straße 23, 4025 Ansfelden | Phone: +43-7229-88060 | www.xyzmo.com

Fiscalnumber 09 258/9720 | VAT-ID: ATU70125036

Abstract

Maximising the value of digital transformation is important in most industries—and critical

for survival against competition for some. Organizations that sell virtual rather than physical products, especially, have a cost base that is largely focused on development, marketing and distribution as well as servicing which makes such organizations highly sensitive to digital transformation. For these, there needs to be a concerted focus on automating core activities to boost self-service and “straight through” transaction processing.

With online e-signing it's easy to get documents signed on their own devices without having to meet the recipient in-person. Simply send documents links out for signature to other people, get instant visibility into your document status, access completed documents, and much more. Whether you or your recipients are in the office, at home, or on the go, online e-signing works every time from every device.

If you send documents out for signature, the recipient gets an email with a link to your document and can sign on a smartphone, tablet, or any web/HTML5-enabled device without the need to download anything. You can have multiple signers and get them to sign in the order you need. E-signatures don't just let you reach customers on the devices they most commonly use; they also let you create compliance and comfortable engagement. E-signature solutions allow you to build in markers (tags) and metadata about documents that can help consumers understand what they are signing and what fields they have to fill out. To eliminate human error, electronic documents can also include auto-check tools that identify common mistakes in time. All these functions together add up to a better quality of the contracts and customer experience.

This white paper will help you to understand what a remote online e-signing solution needs to provide. With an emphasis on why the last mile to the signer needs to be closely managed and what this includes, it will help you to select the most appropriate methodologies for authenticating a remote signer. Then we will discuss the most fitting use for each signing technology—biometric, HTML5, or certificate-based signing—and why this is, depending on the actual use case. There you will see that e-signing is about more than simply signing digital documents—it’s about optimizing the whole process. Finally, we also illustrate the end-to-end business process that a real-customer (The Phone House) has implemented.

Page | 2 Table of Contents Abstract

1 Typical Functionalities

1.1 Definition of the transaction (signing-envelope)

1.1 Complete the transaction (signing)

1.2 Reporting

2 Managing the Last Mile

1.3 Creating transactions with multiple documents

1.4 Routing / Workflow

1.5 Defining document ceremony per recipient

1.6 Reminders and alerts

1.7 Dashboards

3 Authentication Methods

1.8 Email authentication

1.9 Recipients required to enter an access code

1.10 Leveraging trusted authentication models that you already have in place........... 8 1.11 Using social networking IDs such as Facebook login

1.12 Sending an SMS with a one-time password

1.13 Authentication with national identity cards or passports

1.14 Authentication and signing with third-party digital certificates

4 E-Signing Technologies

1.15 HTML5 signatures

1.15.1 Click-2-Sign

1.15.2 Type-2-Sign (Typing the name)

1.15.3 Draw-2-Sign (Drawing the name with a finger, mouse, or stylus)............... 12 1.16 Certificate-based personal signatures

1.17 Forensically identifiable signatures (biometric signatures)

1.17.1 Capturing devices for biometric signatures

1.17.2 Using a smartphone as a signature pad

5 Platform Aspects

6 SIGNificant-References

6.1 The Phone House Netherlands

Page | 3 Typical Functionalities To efficiently process document based transactions with remote recipients via internet,

online signing solutions typically consist of the following three basic functionalities:

• Definition of the transaction (Set up a signing-envelope)

• Complete the transaction (complete the contract and signing)

• Reporting.

Each task has certain typical steps, as outlined below. Additionally the system has to offer administration features to manage the users and templates, and adaptable branding if required.

Definition of the transaction (signing-envelope)

Actions performed by the sender:

–  –  –

1.1 Complete the transaction (signing)

Actions performed by one or more recipients:

• Signers receive an email with a link to the document.

• They click the link.

• There is typically no need to download or sign up for anything.





• They may have to further authenticate themselves, when required by the sender.

• They can review and print the document or complete form fields and add attachments.

• Whenever they are ready, they execute a signature field using a stylus by hand (“Draw to sign” – on their smartphone or tablet), or they "Click to sign" or "Type to sign" from any web-enabled device including PCs with just mouse and keyboard.

The possibilities and requirements of the most important actions in this step of the signing

process is described in detail in the following sections:

Page | 4

• User (signer) authentication (see section 3)

• Signature execution (see section 4).

1.2 Reporting Efficient reporting should help the sender to pay attention on those transactions, which still require actions to successfully finish them. Such transactions are documented and recorded in order to prove them anytime it is necessary. Therefore a simple overview is

essential:

–  –  –

Additionally, you also can send the same documents to a large number of (a bulk of) recipients. Once you send the envelope, a separate envelope for each recipient is created. This is especially useful if e.g. a large group of people need to sign the same document. A typical example is a policy document that all employees must sign.

–  –  –

Page | 6

1.7 Dashboards Dashboard views are important to give a quick overview about the status of your envelopes. Good dashboards not only provide an overview, but also allow a fast search through and editing of the areas that require your attention.

–  –  –

Page | 7

1.8 Email authentication This scenario is typically suited to HTML5 signatures for B2B scenarios and non-businesscritical documents for which you want to make signing as easy as possible. You simply send the link to the inbox of the recipient; no further authentication is necessary. In case of a dispute, you can prove with the audit trail that you sent the document to a specific email address, and often you have the IP-address of the computer and geolocation as well, if the recipient did not explicitly block it.

All of the following authentication methods start with this scenario and add additional authentication steps on top. Although arguably not quite as robust as a full biometric signature, each additional step below adds a little bit more evidential weight in case of dispute, making them good enough for many use cases. Strict methods authenticating the receiver without any doubt also allow implementation of the advanced electronic signature.

You even may go further and require the use of qualified electronic signatures (QES), however resulting in a limited number of potential users. An overview is given in the following sections.

1.9 Recipients required to enter an access code In addition to the above, you can present the recipient with a security request page and require entry of a code to access the documents for viewing and signing. After the access code has been entered correctly, the recipient is led through the normal signing process.

The access code is not sent in the same email that includes the link, as this would make it totally unsecure. Typically, the code is not even sent by email at all, but instead is communicated via another channel such as by phone. To have a code that works for a longer time, you can choose to have the access code agreed upon between the parties in a separate process.

The value of this is in case of a dispute: The sender can prove that the signer must have had access to the access code in order to sign the document.

1.10 Leveraging trusted authentication models that you already have in place Some businesses have customer portals or other software already in place and the user is identified by such systems. Let’s assume the user is within a banking application where he/she manages all his/her transactions. If the user has to sign a document and has already been properly authenticated, then there may be no need for further authentication. But the proof of authentication has to be included in the audit trail in any case.

Another scenario is one in which the recipient already uses a secure authentication method (e.g., a token) for other purposes and this infrastructure is repurposed to authenticate him/her for document signing. As above, the authentication process must be included in the audit trail of the signed document to provide evidence.

1.11 Using social networking IDs such as Facebook login With this scenario, popular social networking sites are used for authentication. Most of them provide services to allow third-party applications to authenticate users. The quality of this authentication depends very much on the quality of the social network profile that is used for authentication. In addition, the quality and amount of the data that you receive about the Page | 8 user from the social network for the audit trail has to be considered as this can be restricted to very basic information types.

1.12 Sending an SMS with a one-time password This authentication method capitalizes on the fact that mobile devices provide, worldwide, a very good means of identification for their owners. Many people carry mobile phones throughout the day and have them within reach at all times. The mobile telephone number is a strong identifier for the owner. This is why many banking and other applications already use this method for online transactions.

Additional security can be added if the one-time password is time-limited, e.g., if the recipient has to enter it within the next 5 minutes.

Another consideration is whether the one-time password should be valid only for one signature or for the entire process.

In addition, it’s recommended to include a unique identifier for the transaction in the SMS sent to the recipient together with the one-time password. This unique identifier should also be displayed in the security dialogue where the recipient has to enter the password, to allow him/her to prove that the password is for this transaction alone and not for another.

All of these messages must form part of a proper audit trail for the purpose of being able to prove everything that has been exchanged in the case of a dispute.

It’s worth considering how the sender should be able to handle and define the one-time

password settings. There are three main options to select from here:

1. The recipient can enter his/her mobile phone number himself. Clearly this is convenient for both the sender and the recipient, but it invites potential misuse by the recipient.

2. The sender defines in advance which mobile number has to be used and the recipient cannot change that. This scenario is very common as it adds considerable security to the process.

3. Finally there are scenarios where both parties—recipient and sender (e.g., a sales employee)—should have no chance to define (change) the mobile number for the recipients and often do not even see them. In this scenario, the sender can only select the recipient from a list of names. The mobile numbers are stored in a central place and cannot be adjusted by the sender. This can even be taken a step further with an upstream process in which the recipient agrees, for example when visiting the branch, in writing that in the future, a one-time password sent to his predefined mobile number can be used as an equivalent to his signature.

Certain countries assign the same legal value to a proper implementation of this method— or special, country-specific versions of it in conjunction with certificate-based signatures (see Section4.2)—as a handwritten wet-ink signature, an example being “Handysignatur” in Austria.

Page | 9

1.13 Authentication with national identity cards or passports Many countries supply their citizens with electronic identity (eID) cards that provide the machine-readable travel document functionality specified by the International Civil Aviation Organization (ICAO). In Europe, most ID cards are based on the European Citizen Card (ECC) specification and not only print the cardholder’s personal data (e.g., name, date and place of birth, nationality) on the face of the card, but also store the data in the integrated chip. Cardholders can use this eID function to carry out legally recognized transactions with public authorities and private companies via the internet.

Germany's new identity card (nPA), for instance, achieves access control of the personal data stored on the card through a Password-Authenticated Connection Establishment (PACE) protocol and Extended Access Control (EAC). The PACE protocol performs user authentication using a Personal Identification Number (PIN) and establishes a secure connection between the ID card and the card reader to protect the communication across the contactless interface. The cardholder gives his/her consent for card access by entering the PIN.



Pages:   || 2 |


Similar works:

«Chapter from: Genetic and Cultural Evolution of Cooperation Edited by P. Hammerstein, 2003 ISBN 0-262-08326-4 © The MIT Press 3 Cooperation without Counting The Puzzle of Friendship Joan B. Silk Department of Anthropology, University of California, Los Angeles, CA 90095, U.S.A. ABSTRACT Cooperative relationships, which involve the exchange of altruistic behaviors that are costly to the actor and beneficial to the recipient, are thought to be the product of kin selection or reciprocal altruism....»

«10 Floor of Mouth Cancer Alain Gerbaulet, Jean-Jacques Mazeron, Dan Ash 1 Introduction Carcinoma of the floor of mouth represents 8% to 12% of all head and neck cancers. Eighty-five to 95% of patients are males; the mean age is 58 years for men and 65 years for women. (15,19) Classical clinical symptoms can be discomfort or pain under the mobile tongue, difficulty with protraction or swallowing, speech impairment, but more frequently, the dentist or the family physician discovers the disease....»

«MAKING THE REVOLUTION: AMERICA, 1763-1791 PRIMARY SOURCE COLLECTION American Antiquarian Society Illustration in broadside (detail), A poem on the b loody engagement that was foughon [i.e., fought on] Bunker's Hill, in Charlestown New-England; on the 17th of June, 1775, by Elisha Rich, 1775 * “We have no choice left to us.” _Sermons on the Outbreak of War, 1775_ As the colonies catapulted to war in spring 1775, notably after the Battle of Lexington and Concord on April 19, American...»

«Available at Applications and http://pvamu.edu/aam Applied Mathematics: Appl. Appl. Math. ISSN: 1932-9466 An International Journal (AAM) Vol. 10, Issue 2 (December 2015), pp. 634 666 PREFACE In Honor and Memory of Professor Lajos Takács August 21, 1924 December 4, 2015 Professor Emeritus of Mathematics & Statistics Case Western Reserve University, Cleveland, Ohio, USA & An elected member of the Hungarian Academy of Sciences A World Leading Mathematician, a Pioneer in the field of Queueing...»

«Revista de Literatura, 2015, enero-junio, vol. LXXVII, n.o 153, págs. 47-73, ISSN: 0034-849X doi: 10.3989/revliteratura.2015.01.002 Hagiografía y censura en el teatro clásico Hagiography and Censorship in Theater of the Golden Age Héctor Urzáiz Tortajada Universidad de Valladolid RESUMEN Se estudia la censura de 24 comedias manuscritas de temática religiosa, sobre todo hagiográfica, fechadas entre 1600-1745; la mayoría son obras o autores poco conocidos: La loca del cielo, El hijo del...»

«BENEDICTINE UNIVERSITY SUCCESSFUL PRACTICES AND MODELS OF ENROLLMENT MANAGEMENT IN ILLINIOS COMMUNITY COLLEGES: AN EXPLANATORY MIXED-METHODS RESEARCH CASE STUDY A DISSERTATION SUBMITTED TO THE GRADUATE SCHOOL IN CANDIDACY FOR THE DEGREE OF DOCTOR OF EDUCATION BY ANDREA LEHMACHER LISLE, IL MAY, 2012 Copyright by Andrea Lehmacher, 2012 All rights reserved. ii ACKNOWLEDGEMENTS I would like to thank my family, friends and colleagues who supported and encouraged me along my journey. First, I would...»

«University of Brighton SOOT CHARACTERISATION IN DIESEL ENGINES USING LASER-INDUCED INCANDESCENCE BENOIT OGER Ph.D 2012 COPYRIGHT Attention is drawn to the fact that copyright of this thesis rests with its author. This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and that no quotation from the thesis and no information derived from it may be published without the prior written consent of the...»

«UNIVERSIDADES ESTRATÉGICAS Red de universidades para la promoción de la planificación estratégica participativa Socios UCAT Medellín, 15 de Abril de 2012 (Versiones anteriores: 28.03, 07 y 09.04.2012) Por Carlo Tassara ESTUDIO SOBRE DEMANDA DE FORMACIÓN, SERVICIOS DE APOYO Y CONSULTORÍAS Nombre IES: Universidad Nacional de San Martín (UNSAM), Argentina Nombre/s autor/es: María Pia VALLARINO – Eduardo CODIANNI – A. Andrés BRANDANI Fecha de envío a FUCN: 01-07-2012 ESTUDIO SOBRE...»

«EARTH SURFACE PROCESSES AND LANDFORMS, VOL 22, 835–848 (1997) HOW WIDE IS A ROAD? THE ASSOCIATION OF ROADS AND MASSWASTING IN A FORESTED MONTANE ENVIRONMENT MATTHEW C. LARSEN* AND JOHN E. PARKS US Geological Survey, GSA Center, 651 Federal Blvd, Guaynabo, Puerto Rico 00965, USA Received 11 March 1996; Revised 27 July 1996; Accepted 6 August 1996 ABSTRACT A spatial data base of 1609 landslides was analysed using a geographic information system to determine landslide frequency in relation to...»

«Lakes A Zone Design Guide for Buildings 1 LAKES A ZONE DESIGN GUIDE for BUILDINGS September 2002 2 LAKES A ZONE DESIGN GUIDE for BUILDINGS September 2002 Low profile buildings of simple, contemporary form, and mid to dark finishes, can be unobtrusively nestled in to the lower slopes and vegetation of the lakes landscapes. Even with glazed front facades, large overhangs can provide shading to prevent these glinting in the sunlight. Rotorua District Council Private Bag RO 3029 Rotorua tel. (07)...»

«MARIANNA MOUSOULIDES, CURRICULUM VITAE, 2013 CURRICULUM VITAE NAME: MARIANNA MOUSOULIDES (BA, BSc, ACIB, MBA) 12 Perseos Street, 2334 Lakatamia, Nicosia, Cyprus Tel.: 22464658 (Home), 22718690 (Office), 99536219 (Mobile) E-mail: mmousoulides@cytanet.com.cy CURRENT POSITION: Branch Manager EMPLOYER: The Cyprus Popular Bank Ltd (Laiki Bank) P.O. Box 22032, CY-1598 Nicosia, Cyprus PERSONAL DATA: Date of birth: 14/02/1973 Nationality: Greek Cypriot Marital status: Married Languages: Greek (Native),...»

«NAT Traversal for VoIP and Internet Communications using STUN, TURN and ICE Eyeball AnyFirewall™ Technology White Paper Oct 2007 Table of Contents 1 Introduction 1 2 The NAT and Firewall Traversal Problem for VoIP 1 2.1 The NAT/Firewall Traversal Challenge _ 2 2.2 NAT Traversal Solution Requirements _ 4 3 Solving the NAT Traversal Problem _ 5 4 How ICE Methodology Works 6 5 Eyeball AnyFirewall™ Technology _ 9 5.1 Eyeball AnyFirewall Engine _ 10 5.2 Eyeball AnyFirewall Server 11 5.3 VoIP...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.