CA2138919C - Electronic signature method and apparatus - Google Patents

Electronic signature method and apparatus

Info

Publication number
CA2138919C
CA2138919C CA002138919A CA2138919A CA2138919C CA 2138919 C CA2138919 C CA 2138919C CA 002138919 A CA002138919 A CA 002138919A CA 2138919 A CA2138919 A CA 2138919A CA 2138919 C CA2138919 C CA 2138919C
Authority
CA
Canada
Prior art keywords
signature
document
image
hash value
generate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002138919A
Other languages
French (fr)
Other versions
CA2138919A1 (en
Inventor
Hiroshi Miyauchi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Publication of CA2138919A1 publication Critical patent/CA2138919A1/en
Application granted granted Critical
Publication of CA2138919C publication Critical patent/CA2138919C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

Electronic signature apparatus and method provide an electronic signature that can be created only by a signer, but cannot be used for other than the signature object document to be processed, and that can be verified and authenicated as an image. Since the verified result is an image, such as a print of a seal and a signature, the verifier can easily verify the validity of the image. In addition, since a signature image and a signature object document may separately be processed, combined, and decomposited upon decryption, they can effectively be used for a printed signature.

Description

ELECTRONIC SIGNATURE METHOD AND APPARATUS
Background of the Invention 1. Field of the Invention The present invention relates to a method for signing an electronic document in the same manner as a plain paper document and an apparatus thereof.
2. Description of the Related Art Conventional cryptosystems can be categorized as secret-key cryptosystems and public-key cryptosystems. An example of the latter is the RSA cryptosystem used for digital signatures. The RSA cryptosystem is disclosed in, for example, United States Patent No. 4,405,829. The RSA cryptosystem is based on power-residual operations, which require a large number of arithmetic operations. In addition, the security of the RSA
cryptosystem has not been strictly proved.
In the conventional signing method, the validity of a signature is judged and is determined and after that, a message that represents whether the signature is valid or invalid is supplied to a verifier.
In such a method, there are two drawbacks. As the first drawback, the user cannot know whether the validity of a signature was actually verified by the system or a message that represents the validity was forged and merely presents a display described "validity". As the second drawback, when the electronic signature is printed on a paper, the user cannot know and confirm whether or not the document was created by the signer and so whether or not the signature document is valid.

Summary of the Invention To solve such drawbacks of the related art reference, a first aspect of the present invention is an electronic signa-tune method having a first step and a second step, the first step comprising inputting a signature image of a signer, a signature object document to be signed, and secret information of the signer, hashing the signature object document to be signed so as to generate a hash value, transforming the signa-ture image with the hash value, and transforming the transformed signature image with the secret information so as to generate a signature document, and the second step comprising inputting the signature document, a signature object document to be signed, and signer's public information, transforming the signature document with the public information, hashing the signature object document to be signed so as to generate a hash value, and transforming the transformed signature document with the hash value so as to generate a signature image.
To solve such drawbacks of the related art reference, a second aspect of the present invention is an electronic signa-ture apparatus, comprising first input means for inputting a signature image of a signer, second input means for inputting a signature object document to be signed, third input means for inputting secret information of the signer, hashing means for hashing the signature object document to be signed so as to generate a hash value, transforming means for transforming the signature image with the hash value, a signature document generating means for transforming the transformed signature image with the secret information so as to generate a signature document, and output r..
.j".

2I389~9 means for outputting the signature document.
To solve such drawbacks of the related art reference, a third aspect of the present invention is an electronic signature apparatus, comprising first input means for inputting a signature document, second input means for inputting public information of a signer, third input means for inputting a signature object document to be signed, transforming means for transforming the signature document with the public information, hashing means for hashing the signature object document to be signed so as to generate a hash value, signature image generating means for transforming the transformed signature document with the hash value so as to generate a signature image, and output means for outputting the signature image.
According to the present invention, a signature image is encrypted with a combination of a public-key cryptosystem and a secret-key cryptosystem. The techniques of the public-key cryptosystem and hash function is described in "Theory of Modern Cryptographic Techniques (translated title)" (by Ikeno and Oyama, The Institute of Electronics, Information and Communication Engineers, Japan, 1986). Next, the secret-key cryptosystem and public-key cryptosystem will be described in brief by using symbols used in this description.
The secret-key cryptosystem is a technique where the same key is used for both encryption and decryption. There is the following relation between an encrypting function fl and a decrypting function f2.
~/M, K: f2(f1(M, K), K) - M
where M is a message; and K is a secret key.
~~Without secret key K, it is difficult to decrypt message M from an encrypted document C = fl(M, K).
In addition, there is the following relation among an encrypting function gl, a decrypting function g2, an encrypting (secret) key S, and a decrypting (public) key P:
'dA: g2 (gl (A, S) , P) - A
where A is a message; S is an encrypting secret key; and P is a decrypting public key.
With one of the decrypting public key P and the encrypting secret key S, it is exceedingly difficult to obtain the other (S or P).
In accordance with the present invention, there is provided an electronic signature method having an encryption step and a verification step, wherein said encryption step comprises the steps of: (a) inputting a signature image of a signer, a signature object document to be signed, and secret information of the signer; (b) hashing the signature object document to generate a hash value; (c) encrypting the signature image with the hash value generated by said hashing step (b);
and (d) encrypting the encrypted signature image in accordance with the secret information to generate a signature document;
and wherein said verification step comprises the steps of: (e) inputting the signature document, the signature object document, and public information of the signer; (f) decrypting the signature document to generate a decrypted signature document in accordance with the public information; (g) hashing the signature object document to generate a hash value; and (h) decrypting the decrypted signature document with the hash value generated by said hashing step (g) to generate a restored signature image.
In accordance with another aspect of the invention, there is provided an electronic signature apparatus, comprising:
first input means for inputting a signature image of a signer;
second input means for inputting a signature object document to be signed; third input means for inputting secret information of the signer; hashing means for hashing the signature object document to generate a hash value; encrypting means for encrypt-ing the signature image with the hash value generated by said hashing means; signature document generating means for encrypt-ing the encrypted signature image in accordance with the secret information to generate a signature document; and output means for outputting the signature document.
In accordance with a further aspect of the invention, there is provided an electronic signature apparatus, comprising:
first input means for inputting a signature document; second input means for inputting public information of a signer; third input means for inputting a signature object document to be signed; decrypting means for decrypting the signature document in accordance with the public information; hashing means for hashing the signature object document to generate a hash value;
image generating means for decrypting the decrypted signature document with the hash value to generate a signature image; and output means for outputting the signature image.
In accordance with a still further aspect of the invention, there is provided an electronic signature apparatus, comprising: first input means for inputting a signature image 'of a signer; second input means for inputting a signature object document to be signed; third input means for inputting secret information of the signer; first hashing means for hashing the signature object document to generate a first hash value; encrypting means for encrypting the signature image with the first hash value; signature document generating means for encrypting the encrypted signature image in accordance with the secret information to generate a signature document; first output means for outputting the signature document and the signature object document; fourth input means for inputting the signature document; fifth input means for inputting public information of the signer; sixth input means for inputting the signature object document; decrypting means for decrypting the signature document in accordance with the public information;
second hashing means for hashing the signature object document to generate a second hash value; image generating means for decrypting the decrypted signature document with the second hash value to generate a restored signature image; and second output means for outputting the restored signature image.
For the theory of cryptosystems, the following reference documents are available:
"Computer Communications Securities - Principles, Standard Protocols and Techniques", by Warwick Ford, PRT
Prentice Hall, Inc.
"Theory of Modern Cryptographic Techniques (Trans-lated title)", by Shinich Ikezawa and Kenji Oyama, The Institute of Electronics, Information and Communication Engineers, Japan.
"Introduction to Theory of Cryptographic Techniques (Translated title)", by Eiji Okamoto, Kyoritsu Publishing Company, 1993.
These and other objects, features and advantages of the present invention will become more apparent in light of the following detailed description of best mode embodiments thereof, as illustrated in the accompanying drawings.
Brief Description of Drawings Figs. la and lb show process flows according to first, second, and third aspects of the present invention, where Fig.
la is a flow chart showing a process for encrypting a signature document and Fig. lb is a flow chart showing a process for decrypting the encrypted signature document and generating a signature image;
Fig. 2 is a block diagram showing an apparatus for encrypting a signature image and a signature object document to be signed according to the second aspect of the present invention; and Fig. 3 is a block diagram showing an electronic signature apparatus for decrypting an encrypted signature document according to a third aspect of the present invention.
Description of Preferred Embodiments Before explaining preferred embodiments of the present invention, the theory of operation of the present invention will be described.
According to the present invention, a signature image G is input as a message. The signature image is digital information of, for example, a print of a seal or a written signature. When a signature object document is signed, the signature image may be input through an input device such as a scanner or be stored as digital information in, for example, an electronic file.
Next, the method for generating a signature document will be described. At first, a hash value of a signature object document to be signed is generated. The signature object document to be signed is denoted by the signature object document M.
H = hash (M) where "hash" is a hash function such as MD5 message-digest algorithm.
Thereafter, a signature image G is encrypted with a key of the hash value H corresponding to a secret-key crypto-system. Then an encryption function A is transformed with the hash value H.
A = fl (G, H) Thereafter, the encryption function A is encrypted with a secret-key S that a signer has in secret by using a method of a public-key cryptosystem. Then an encryption function X is shown by next expression.
X = gl (A, S) where X is a signature document. Since X uses the hash value of the document M, a signature document depends on a signature object document to be processed and so if the signature object document, M, is different from other signature object documents, the signature document, X, will be different from other signature documents. To generate a signature document, since ~:~',Y Vie, F -the secret-key S of the signer is used, people other than the signer cannot correctly create the signature document X.
The signature is verified for a user authentication in the following manner. First, the signature document X is decrypted with the public-key P corresponding to a method of a public-key cryptosystem. So, a decryption function B is following.
B = g2 (X, P) When the signature generation and the verification thereof are correctly performed, the following relation is satisfied to the encryption function A.
A = B
Thereafter, the decryption function B is decrypted with a key of the hash value H of the document M corresponding to a method of the secret-key cryptosystem.
G' - f2 (B, H) When the signature generation and the verification thereof are correctly performed, the following relation is satisfied to the signature image G.
G' - G
Thus, the signature image G is restored. The result of the signature verification is output to the display of a computer or onto a sheet of paper so as to allow the user to verify and authenticate the signature.
If the secret key of the signer is incorrect or the signature document is used for other than the signature object document to be processed, the following relation takes place.
G' ~ G
Thus, the signature document cannot be restored and the signature image G cannot be restored. Generally, G' is a random image. Consequently, when the signature image is correctly restored, it is verified and authenticated that the signer signed to the signature object document.
According to the present invention, the signature document is generated and verified corresponding to the above-mentioned theory.
Next, preferred embodiments of the present invention will be described.
Figs. la and lb show process flow charts according to first, second, and third aspects of the present invention.
Fig. 2 is a block diagram showing an apparatus for encrypting a signature image and a signature object document to be signed according to the second aspect of the present invention. Fig.
3 is a block diagram showing an electronic signature apparatus for decrypting an encrypted signature document according to a third aspect of the present invention. Next, with reference to Figs. la, lb, 2, and 3, the first, second, and third aspects of the present invention will be described.
In Fig. 2, reference numeral 11 is a signature image input mean s. The signature image input means 11 inputs a signature image such as a print of a seal, a written signature, a fingerprint, or the like in digital form. The signature image G is sent to a signature image transforming means 15.
Reference numeral 12 is a signature object document input means.
The signature object document input means 12 inputs a signature object document M to be signed in digital form. The signature " ~~object document M to be signed is sent to a hashing means 14.
Reference numeral 13 is a signer's secret information input means. The signer's secret information input means 13 inputs a secret key of a signer and sends it to a signature document generating means 16. Accordingly, at step S11 of Fig. la, the signature image G, the secret information of signer S and the signature object document M are inputted.
When the hashing means 14 receives the signature object document to be signed from the signature object document input means 12, the hashing means 14 generates a hash value H
of the signature object document M to be hashed with a prede-termined hash function and sends the hash value H to the signature image transforming means 15. Accordingly, at step S12 of Fig. la, the next step is to generate the hash value H
to be hashed with the predetermined hash function.
The signature image transforming means 15 encrypts the signature image G received from the signature image input means 11 with a key of the hash value H received from the hash-ing means 14 corresponding to a method of a secret-key crypto-system and sends the encrypted result to signature document generating means 16. Accordingly, at step S13 of Fig. la, a transform value is generated from the signature image G to an encryption function A with the hash value H, according to the encrypted function A = fl(G, H).
The signature document generating means 16 receives the encrypted result from the signature image transforming means 15 and encrypts the encrypted result with a key received from the signer's secret information input means 13 correspond-ing to a method of a public-key cryptosystem and generates a '4signature document X. The generated signature document is sent to a signature document output means 17. Accordingly, at step S14 of Fig. la, a signature document is generated according to the encryption function X = gl(A, S).
The signature document output means 17 receives the signature document X from the signature document generating means 16 and outputs the signature document X to the outside of the apparatus (accordingly, step S15 of Fig. la outputs the signature document X). The encrypting apparatus of the electronic signature apparatus sends digital information of the signature document X and the signature object document M to be signed as composite digital information to a decrypting apparatus.
Next, with reference to Fig. 3, a decrypting apparatus that decrypts encrypted data according to the present invention will be described.
In Fig. 3, reference numeral 20 is a distributor that distributes the above-mentioned composite digital information.
The composite digital information are separated into the signature document X and the signature object document M by the distributor 20.
Reference numeral 21 is a signature document input means. The signature document input means 21 inputs the signature document X as digital information and sends it to a signature document transforming means 24. Reference numeral 22 is a signer's public information input means. The signer's public information input means 22 inputs a public decrypting key P of a signer and sends it to the signature document ';a.

transforming means 24. Reference numeral 23 is a signature object document input means. The signature object document input means 23 inputs a signature object document M to be signed in digital form and sends it to a hashing means 25.
Accordingly, at step S21 of Fig. lb, the signature document X, the public decrypting key P, and the signature object document M are inputted.
The signature document transforming means 24 decrypts the signature document X received from the signature document input means 25 with the decrypting key received from the signer's public information input means 22 corresponding to a method of a public-key cryptosystem and sends the decrypted signature document B to a signature image generating means 26.
Accordingly, at step S22 of Fig. lb, the signature document is transformed and the decrypted signature document (transformed value) B = g2(X, P) is generated.
The hashing means 25 receives the signature object document from the signature object document input means 23, generates a hash value H of the signature object document with a predetermined hash function, and sends the hash value H to the signature image generating means 26. Accordingly, at step S23 of Fig. lb, the next step is to generate the hash value H = hash (M) .
The signature image generating means 26 receives the decrypted information from the signature document transforming means 24, decrypts it with the hash value received from the hashing means 25 corresponding to a method of secret-key crypto-system, restores a signature image, and sends the signature ~

~ f image to a signature image output means 27. Accordingly, at step S24 of Fig. lb, the signature image is generated according to the decryption function G = f2(B, H).
The signature image output means 27 receives the signature image G from the signature image generating means 26 and outputs it to the outside of the decryption apparatus.
Accordingly, at step S25 of Fig. lb, the signature image G is outputted. After that, the signature image G is verified and authenticated by user.
According to the present invention, an electronic signature that can be created only by a signer, that cannot be used for other than the signature object document to be processed, and that can be verified as a result of signature verification of a signature image is accomplished. According to the present invention, since the verified result is an image such as a print of a seal and a signature, the verifier can easily verify the validity of the signature image. In addition, since a signature image and a signature object document are separately processed and combined at sending to the decryption apparatus, they can be effectively printed.
Although the present invention has been shown and described with respect to best mode embodiments thereof, it should be understood by those skilled in the art that the fore-going and various other changes, omissions, and additions in the form and detail thereof may be made therein without depart-ing from the spirit and scope of the present invention.

r~
s";~

Claims (14)

1. An electronic signature method having an encryption step and a verification step, wherein said encryption step comprises the steps of:
(a) inputting a signature image of a signer, a signature object document to be signed, and secret information of the signer;
(b) hashing the signature object document to generate a hash value;
(c) encrypting the signature image with the hash value generated by said hashing step (b); and (d) encrypting the encrypted signature image in accordance with the secret information to generate a signature document;
and wherein said verification step comprises the steps of:
(e) inputting the signature document, the signature object document, and public information of the signer;
(f) decrypting the signature document to generate a decrypted signature document in accordance with the public information;
(g) hashing the signature object document to generate a hash value; and (h) decrypting the decrypted signature document with the hash value generated by said hashing step (g) to generate a restored signature image.
2. The electronic signature method as set forth in claim 1, wherein the step (c) is performed by encrypting the signature image with the hash value corresponding to a method of a secret-key cryptosystem.
3. The electronic signature method as set forth in claim 1, wherein the step (d) is performed by encrypting the encrypted signature image with the secret information corresponding to a method of a public-key cryptosystem.
4. The electronic signature method as set forth in claim 1, wherein the step (f) is performed by decrypting the signature document with the public information corresponding to a public-key cryptosystem.
5. The electronic signature method as set forth in claim 1, wherein the step (h) is performed by decrypting the decrypted signature document with the hash value corresponding to a secret-key cryptosystem.
6. The electronic signature method as set forth in claim 1, wherein the signature image is a print of a seal, a written signature, or a fingerprint.
7. An electronic signature apparatus, comprising:
first input means for inputting a signature image of a signer;
second input means for inputting a signature object document to be signed;

third input means for inputting secret information of the signer;
hashing means for hashing the signature object document to generate a hash value;
encrypting means for encrypting the signature image with the hash value generated by said hashing means;
signature document generating means for encrypting the encrypted signature image in accordance with the secret information to generate a signature document; and output means for outputting the signature document.
8. The electronic signature apparatus as set forth in claim 7, wherein said encrypting means encrypts the signature image with the hash value corresponding to a secret-key cryptosystem.
9. The electronic signature apparatus as set forth in claim 7, wherein said signature document generating means encrypts the encrypted signature image with the secret information corresponding to a public-key cryptosystem to generate the signature document.
10. The electronic signature apparatus as set forth in claim 7, wherein the signature image is a print of a seal, a written signature, or a fingerprint.
11. An electronic signature apparatus, comprising:
first input means for inputting a signature document;
second input means for inputting public information of a signer;

third input means for inputting a signature object document to be signed;
decrypting means for decrypting the signature document in accordance with the public information;
hashing means for hashing the signature object document to generate a hash value;
image generating means for decrypting the decrypted signature document with the hash value to generate a signature image; and output means for outputting the signature image.
12. The electronic signature apparatus as set forth in claim 11, wherein said decrypting means decrypts the signature document with the public information corresponding to a public-key cryptosystem.
13. The electronic signature apparatus as set forth in claim 11, wherein said image generating means decrypts the decrypted signature document with the hash value corresponding to a secret-key cryptosystem to generate the signature image.
14. An electronic signature apparatus, comprising:
first input means for inputting a signature image of a signer;
second input means for inputting a signature object document to be signed;
third input means for inputting secret information of the signer;
first hashing means for hashing the signature object document to generate a first hash value;

encrypting means for encrypting the signature image with the first hash value;
signature document generating means for encrypting the encrypted signature image in accordance with the secret information to generate a signature document;
first output means for outputting the signature document and the signature object document;
fourth input means for inputting the signature document;
fifth input means for inputting public information of the signer;
sixth input means for inputting the signature object document;
decrypting means for decrypting the signature document in accordance with the public information;
second hashing means for hashing the signature object document to generate a second hash value;
image generating means for decrypting the decrypted signature document with the second hash value to generate a restored signature image; and second output means for outputting the restored signature image.
CA002138919A 1993-12-27 1994-12-22 Electronic signature method and apparatus Expired - Fee Related CA2138919C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP330558/1993 1993-12-27
JP5330558A JP2762909B2 (en) 1993-12-27 1993-12-27 Electronic signature device

Publications (2)

Publication Number Publication Date
CA2138919A1 CA2138919A1 (en) 1995-06-28
CA2138919C true CA2138919C (en) 1999-09-14

Family

ID=18233998

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002138919A Expired - Fee Related CA2138919C (en) 1993-12-27 1994-12-22 Electronic signature method and apparatus

Country Status (3)

Country Link
US (1) US5689567A (en)
JP (1) JP2762909B2 (en)
CA (1) CA2138919C (en)

Families Citing this family (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1011509A (en) * 1996-06-26 1998-01-16 Wacom Co Ltd Electronic document security system, electronic stamping security system and electronic signature security system
JP3154325B2 (en) * 1996-11-28 2001-04-09 日本アイ・ビー・エム株式会社 System for hiding authentication information in images and image authentication system
US6529446B1 (en) 1996-12-20 2003-03-04 Telaric L.L.C. Interactive medication container
US6611733B1 (en) 1996-12-20 2003-08-26 Carlos De La Huerga Interactive medication dispensing machine
US5926552A (en) * 1997-01-24 1999-07-20 Mckeon; Paul System and process for guaranteeing signatures on securities
JPH10261082A (en) * 1997-03-19 1998-09-29 Kiyadeitsukusu:Kk Registered signature data preparing method for computer signature collating system
US7978564B2 (en) 1997-03-28 2011-07-12 Carlos De La Huerga Interactive medication container
US5960085A (en) 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
JP3988172B2 (en) * 1997-04-23 2007-10-10 ソニー株式会社 Information processing apparatus and method, and recording medium
US6757826B1 (en) 1998-04-14 2004-06-29 Citicorp Development Center, Inc. Digital graphic signature system
US6487301B1 (en) * 1998-04-30 2002-11-26 Mediasec Technologies Llc Digital authentication with digital and analog documents
US7039805B1 (en) 1998-05-20 2006-05-02 Messing John H Electronic signature method
JP4323098B2 (en) * 1998-08-04 2009-09-02 富士通株式会社 A signature system that verifies the validity of user signature information
RU2153191C2 (en) 1998-09-29 2000-07-20 Закрытое акционерное общество "Алкорсофт" Method for blind production of digital rsa signature and device which implements said method
DE19847943A1 (en) 1998-10-09 2000-04-13 Deutsche Telekom Ag Digital water mark generation method for documents used for identification
RU2157001C2 (en) 1998-11-25 2000-09-27 Закрытое акционерное общество "Алкорсофт" Method for conducting transactions
US7171000B1 (en) 1999-06-10 2007-01-30 Message Secure Corp. Simplified addressing for private communications
DE19923807A1 (en) * 1999-05-19 2000-11-23 Deutsche Telekom Ag Procedures to increase security with digital signatures
US20020019932A1 (en) * 1999-06-10 2002-02-14 Eng-Whatt Toh Cryptographically secure network
US20020101998A1 (en) * 1999-06-10 2002-08-01 Chee-Hong Wong Fast escrow delivery
US6988199B2 (en) 2000-07-07 2006-01-17 Message Secure Secure and reliable document delivery
US6189009B1 (en) 1999-08-27 2001-02-13 The Voice.Com, Inc. System and method for integrating paper-based business documents with computer-readable data entered via a computer network
AU775595B2 (en) 1999-08-27 2004-08-05 Comfidex Corp. System and method for integrating paper-based business documents with computer-readable data entered via computer network
US7933780B2 (en) 1999-10-22 2011-04-26 Telaric, Llc Method and apparatus for controlling an infusion pump or the like
US6711554B1 (en) 1999-12-30 2004-03-23 Lee Salzmann Method and system for managing and preparing documentation for real estate transactions
US6968317B1 (en) * 2000-04-28 2005-11-22 Charles Schwab & Co., Inc. Method and apparatus for new accounts program
US7251728B2 (en) 2000-07-07 2007-07-31 Message Secure Corporation Secure and reliable document delivery using routing lists
US20020048372A1 (en) * 2000-10-19 2002-04-25 Eng-Whatt Toh Universal signature object for digital data
US20020093573A1 (en) * 2001-01-12 2002-07-18 International Business Machines Corporation Digital camera for authenticating a digital visual image
US7607018B2 (en) * 2001-05-08 2009-10-20 Ip.Com, Inc. Method and apparatus for collecting electronic signatures
US20030012374A1 (en) * 2001-07-16 2003-01-16 Wu Jian Kang Electronic signing of documents
WO2003009217A1 (en) * 2001-07-16 2003-01-30 Trustcopy Pte Ltd. Electronic signing of documents
US8117450B2 (en) * 2001-10-11 2012-02-14 Hewlett-Packard Development Company, L.P. System and method for secure data transmission
US20030145200A1 (en) * 2002-01-31 2003-07-31 Guy Eden System and method for authenticating data transmissions from a digital scanner
US20030221109A1 (en) * 2002-05-24 2003-11-27 Pure Edge Solutions, Inc. Method of and apparatus for digital signatures
US7451321B2 (en) * 2003-10-07 2008-11-11 Joseph Ernest Dryer Electronic signature management method
US20060136731A1 (en) * 2004-12-21 2006-06-22 Signaturelink, Inc. System and method for providing an online electronic signature
US8588483B2 (en) * 2004-12-21 2013-11-19 Signaturelink, Inc. System and method for providing a real-time, online biometric signature
US7814129B2 (en) * 2005-03-11 2010-10-12 Ross Neil Williams Method and apparatus for storing data with reduced redundancy using data clusters
US8051252B2 (en) * 2005-03-11 2011-11-01 Ross Neil Williams Method and apparatus for detecting the presence of subblocks in a reduced-redundancy storage system
US20070076240A1 (en) * 2005-10-04 2007-04-05 Kabushiki Kaisha Toshiba Image processing system
US7499552B2 (en) 2006-01-11 2009-03-03 International Business Machines Corporation Cipher method and system for verifying a decryption of an encrypted user data key
GB0622149D0 (en) * 2006-11-07 2006-12-20 Singlepoint Holdings Ltd System and method to validate and authenticate digital data
ATE466347T1 (en) * 2007-01-15 2010-05-15 Stepover Gmbh METHOD AND DEVICE FOR SECURING A DOCUMENT WITH AN INSERT SIGNATURE IMAGE AND BIOMETRIC DATA IN A COMPUTER SYSTEM
EP2127195A2 (en) * 2007-01-22 2009-12-02 Global Crypto Systems Methods and systems for digital authentication using digitally signed images
US9514117B2 (en) 2007-02-28 2016-12-06 Docusign, Inc. System and method for document tagging templates
US8655961B2 (en) 2007-07-18 2014-02-18 Docusign, Inc. Systems and methods for distributed electronic signature documents
US8949706B2 (en) * 2007-07-18 2015-02-03 Docusign, Inc. Systems and methods for distributed electronic signature documents
JP5067881B2 (en) * 2008-07-11 2012-11-07 キヤノン株式会社 Image processing apparatus and image processing method
WO2010037407A1 (en) 2008-09-30 2010-04-08 Stepover Gmbh Method and device for electronically capturing a handwritten signature and safeguarding biometric data
US20100100743A1 (en) 2008-10-17 2010-04-22 Microsoft Corporation Natural Visualization And Routing Of Digital Signatures
BRPI0902945A2 (en) * 2009-03-12 2010-11-23 Sergio Leal Fonseca mobile electronic document signer
EP2406715A4 (en) * 2009-03-13 2013-01-16 Docusign Inc Systems and methods for document management transformation and security
CN101697191B (en) * 2009-10-23 2012-10-17 北京派瑞根科技开发有限公司 Electronic signature for signing on electronic paper endorsement
CN101697190B (en) * 2009-10-23 2012-10-17 北京派瑞根科技开发有限公司 Electronic signature for signing on electronic paper
CN101854418A (en) * 2010-01-27 2010-10-06 江苏华安高技术安防产业有限公司 Short message content handwriting encryption and decryption realization method based on address list
EP2367128B1 (en) * 2010-03-16 2015-10-14 Stepover GmbH Device and method for electronic signatures
US9251131B2 (en) 2010-05-04 2016-02-02 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control
CA2802358C (en) 2010-06-11 2019-06-11 Docusign, Inc. Web-based electronically signed documents
US9268758B2 (en) 2011-07-14 2016-02-23 Docusign, Inc. Method for associating third party content with online document signing
JP6100773B2 (en) 2011-07-14 2017-03-22 ドキュサイン,インク. Identification and verification of online signatures in the community
US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
US10511732B2 (en) 2011-08-25 2019-12-17 Docusign, Inc. Mobile solution for importing and signing third-party electronic signature documents
EP2748721B1 (en) 2011-08-25 2022-10-05 DocuSign, Inc. Mobile solution for signing and retaining third-party documents
US9230130B2 (en) 2012-03-22 2016-01-05 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
US10015016B2 (en) 2015-01-28 2018-07-03 Bank Of America Corporation Method and apparatus for maintaining a centralized repository that stores entitlement capability for authorized signatories
CN111030825A (en) * 2019-12-03 2020-04-17 南京如般量子科技有限公司 Anti-quantum computation electronic seal system based on secret shared public key pool and signature and verification method thereof

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US5005200A (en) * 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US4879747A (en) * 1988-03-21 1989-11-07 Leighton Frank T Method and system for personal identification
US5355411A (en) * 1990-08-14 1994-10-11 Macdonald John L Document security system
US5465299A (en) * 1992-12-03 1995-11-07 Hitachi, Ltd. Electronic document processing system and method of forming digital signature

Also Published As

Publication number Publication date
CA2138919A1 (en) 1995-06-28
JP2762909B2 (en) 1998-06-11
JPH07191602A (en) 1995-07-28
US5689567A (en) 1997-11-18

Similar Documents

Publication Publication Date Title
CA2138919C (en) Electronic signature method and apparatus
US9455832B2 (en) Signatures with confidential message recovery
US7139910B1 (en) Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record
US7730315B2 (en) Cryptosystem based on a Jacobian of a curve
CN109743171B (en) Key series method for solving multi-party digital signature, timestamp and encryption
US7469048B2 (en) Methods for point compression for jacobians of hyperelliptic curves
US7574596B2 (en) Cryptographic method and apparatus
JPH11122240A (en) Decoder, decoding method, access right authentication system and method therefor
JP4776906B2 (en) Signature generation method and information processing apparatus
US8195947B2 (en) Method and system for conveying alternate acceptable canonicalizations of a digitally signed piece of electronic mail
US20100161992A1 (en) Device and method for protecting data, computer program, computer program product
CN114287003A (en) Privacy preserving signatures
JP2000250408A (en) File authentication system, system and method for signature, system and method for authentication, and recording medium
GB2415579A (en) Authenticating the identity of a message sender in an identifier-based encryption system
US20050021973A1 (en) Cryptographic method and apparatus
Benaloh et al. The private communication technology (pct) protocol
CN113837756A (en) Electronic invoice verification method and system
WO2011039765A2 (en) A system and method for designing digital signature schemes based on message preprocessing functions
US7035403B2 (en) Encryption method and apparatus with escrow guarantees
JPS62216447A (en) Message validation communication system
JP2000041035A (en) System and method for certification and recording medium
JP3331329B2 (en) Public verification possible request restoration blind signature method, apparatus and program recording medium
JP4644368B2 (en) Techniques for generating privately authenticable cryptographic signatures and using such signatures in connection with product reproduction
US20220329439A1 (en) Method for generating digital signatures
KR100412540B1 (en) Security system having a certificate revocation mechanisim

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed