Language selection

Search

Patent 2645213 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2645213
(54) English Title: SECURE SIGNATURES
(54) French Title: SIGNATURES SECURISEES
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06F 15/00 (2006.01)
  • H04L 9/30 (2006.01)
(72) Inventors :
  • CAHILL, JASON (United States of America)
  • CHARLES, DENIS X (United States of America)
  • JAIN, KAMAL (United States of America)
  • LAUTER, KRISTIN E. (United States of America)
(73) Owners :
  • MICROSOFT CORPORATION
(71) Applicants :
  • MICROSOFT CORPORATION (United States of America)
(74) Agent: SMART & BIGGAR LP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2007-04-05
(87) Open to Public Inspection: 2007-11-08
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2007/008678
(87) International Publication Number: WO 2007127038
(85) National Entry: 2008-09-09

(30) Application Priority Data:
Application No. Country/Territory Date
11/611,624 (United States of America) 2006-12-15
60/745,993 (United States of America) 2006-04-28

Abstracts

English Abstract

Systems and methods for secure signatures are described. In one aspect, a secure signature is generated. The secure signature strongly binds an image of an electronic signature (an "electronic signature") to content in either electronic or printed form. Responsive to receiving a request from a user, the systems and methods determine whether an electronic signature associated with a printed page represents a secure signature. If so, the systems and methods determine and notify the user of whether the secure signature was cryptographically bound by a signer of the electronic signature to the content being signed.


French Abstract

La présente invention concerne des systèmes et des procédés de production de signatures sécurisées. Selon un aspect, une signature sécurisée est générée. La signature sécurisée associe de manière très forte une image d'une signature électronique (une ''signature électronique'') à un contenu se présentant sous une forme électronique ou imprimée. En réponse à la réception d'une requête émanant d'un utilisateur, les systèmes et les procédés déterminent si la signature électronique associée à une page imprimée représente une signature sécurisée. Si tel est le cas, les systèmes et les procédés déterminent et notifient à l'utilisateur que la signature sécurisée a été cryptographiquement associée par un signataire de la signature électronique au contenu signé.

Claims

Note: Claims are shown in the official language in which they were submitted.


CLAIMS
1. A computing device comprising:
a processor; and
a memory coupled to the processor, the memory comprising computer-program
instructions executable by the processor, the computer-program instructions
when executed
by the processor for performing operations comprising:
receiving an electronic signature; and
generating a secure signature that securely binds the electronic signature to
content of a printed page, the binding being such that a cryptographic-based
verification
operation can programmatically verify that an author of the electronic
signature expressed a
willingness to be bound to the content of the printed page.
2. The computing device of claim 1, wherein the secure signature is
incorporated into the
electronic signature in a manner that is visually hidden from a viewer of the
printed page.
12

3. The computing device of claim 1, wherein the computer-program instructions
for
generating the secure signature further comprise instructions for:
computing a collision-resistant hash value from content of a document and the
electronic signature, the document being in memory associated with the
computing device,
the printed page representing a printed version of the document;
cryptographically signing the collision resistant hash value to generate a
secure digital
signature; and
embedding the secure digital signature into bits associated with the
electronic
signature.
4. The computing device of claim 3 wherein cryptographically signing the
collision
resistant hash value further comprises cryptographically signing, using a
public-key
cryptographic application, the collision resistant hash value using a private
key of the author,
the private key being one of a private/public key pair of the author for
digitally signing
content using the public-key cryptographic application.
5. The computing device of claim 3 wherein embedding the secure digital
signature
further comprises inserting the secure digital signature into the electronic
signature using a
least significant bit algorithm.
6. The computing device of claim 1, wherein the computer-program instructions
further
comprise instructions for:
receiving a request from a user to verify that an electronic signature
associated with
the printed page actually represents a willingness of a signatory of the
electronic signature to
execute content of the printed page, the request identifying an electronic
version of the
content and a public key of the author;
13

determining whether the electronic signature comprises a secure digital
signature;
if the electronic signature does not comprise the secure digital signature,
notifying the
user that the electronic signature cannot be verified to represent willingness
of the author to
execute the content; and
if the electronic signature comprises the digital signature verifying, using
the public
key, whether the electronic signature represents an willingness of the author
to execute the
content.
7. The computing device of claim 6, wherein the secure digital signature is a
public-key
digital signature generated using a public-key cryptographic application and a
private-key of
the signatory.
8. The computing device of claim 6 wherein the computer-program instructions
for
verifying further comprise instructions for:
decrypting the secure digital signature with the public-key to identify a
first hash
value;
calculating a second hash value from the content and the electronic signature
independent of the secure digital signature;
if the first hash value matches the second hash value, notifying the user that
the
electronic signature is bound to the content; and
if the first hash value does not match the second hash value, notifying the
user that the
electronic signature is not bound to the content.
14

9. A tangible computer-readable data storage medium comprising computer-
program
instructions executable by a processor, the computer-program instructions when
executed by
the processor for performing operations comprising:
cryptographically tying a person's electronic signature to content of a
document by:
digitally signing content of the document and the electronic signature to
create
a digital signature;
embedding the digital signature into bits associated with the electronic
signature to generate a secure signature;
distributing the document comprising the secure signature to end-users for
viewing
and authentication.
10. The computer-readable data storage medium of claim 9, wherein the
electronic
signature was obtained from a printed document.
11. The computer-readable data storage medium of claim 9, wherein digitally
signing
further comprises:
generating a collision-resistant hash from the content and the electronic
signature;
digitally signing the collision resistant hash using a private key of the
person to
generate the digital signature, the private key being a key of a
private/public key pair used for
public-key cryptographic operations; and
wherein the digital signature can be decrypted with only the public key of the
private/public key pair.
12. The computer-readable data storage medium of claim 9, wherein the bits
comprise
least significant bits associated with the electronic signature.

13. A computer-implemented method comprising:
receiving a request from a user to verify that an electronic signature
associated with a
document is cryptographically bound by a signer of the electronic signature to
content of the
document;
evaluating bits of the electronic signature to determine whether the bits
represent an
embedded digital signature;
if the bits do not represent the embedded digital signature, notifying the
user that the
electronic signature is not cryptographically bound to content of the
document; and
if the bits do represent the embedded digital signature, verifying whether the
electronic
signature was cryptographically bound by the signer to the content.
14. The method of claim 13, wherein the document is an electronic document
generated
from a non-electronic document.
15. The method of claim 13, wherein the request identifies the document, the
electronic
signature being part of the document, attached to the document, or logically
associated with
the document.
16. The method of claim 13, wherein the bits are least significant bits.
17. The method of claim 13, wherein verifying whether the electronic signature
was
cryptographically bound by the signer to the content further comprises using
public-key
cryptographic techniques to determine whether the electronic signature was
bound by the
signer to the content.
16

18. The method of claim 13, wherein verifying whether the electronic signature
was
cryptographically bound by the signer to the content further comprises:
decrypting the embedded digital signature with a public key of a
private/public key
pair of the signer to obtain a first hash value;
removing the embedded digital signature from the electronic signature;
calculating a second hash value from the content and the electronic signature;
and
if the first hash value matches the second hash value, indicating to the user
that the
electronic signature was cryptographically bound by the signer to the content.
19. The method of claim 18, wherein the first and second hash values are
collision
resistant.
20. The method of claim 18, wherein the method further comprises notifying, if
the first
hash value does not match the second hash value, the user that the electronic
signature was
not bound by the signer to the content.
17

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
SECURE SIGNATURES
BACKGROUND
[0001] Obtaining a person's hand-written signature is a traditional and useful
technique to establish identity and will of the person (a signatory) to
execute a document (e.g.,
a record, contract, memorandum, etc.), and a willingness of the person to be
bound by content
of the document. Even in this digital age, hand-written signatures are a
necessary part of legal
agreements, bank and credit card transactions, and contracts of all kinds.
When a person
hand-signs a document electronically (e.g., with a pen attached to a pen pad
device such as a
graphics pad, a tablet PC, etc.), a digital image (e.g., a JPEG, TIFF, or
other image type) of
the signature is attached or logically associated with the document. The
digital image of the
hand-written signature is an electronic signature that is a legally binding
equivalent of the
individual's handwritten signature. Using image processing software, a
person's electronic
signature can typically be cut/copied from a document and pasted/copied into a
different
document for unauthorized use. Such unauthorized use includes, for example,
forgery,
spoofing consent, etc. The rapidly rising problem of identity theft
illustrates the ease of
unauthorized uses of electronic signatures.
SUNIMARY
[0002] Systems and methods for secure signatures are described. In one aspect,
a
secure signature is generated. The secure signature strongly binds an image of
an electronic
signature (an "electronic signature") to content in either electronic or
printed form.
Responsive to receiving a request from a user, the systems and methods
determine whether an
electronic signature associated with a printed page represents a secure
signature. If so, the
systems and methods determine and notify the user of whether the secure
signature was
cryptographically bound by a signer of the electronic signature to the content
being signed.
1

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
[0003] This Summary is provided to introduce a selection of concepts in a
simplified
form that are further described below in the detailed description. This
Summary is not
intended to identify key features or essential features of the claimed subject
matter, nor is it
intended to be used as an aid in determining the scope of the claimed subject
matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] Fig. 1 shows an exemplary system for secure signatures, according to
one
embodiment.
[0005] Fig. 2 shows an exemplary.procedure for secure signatures, according to
one
embodiment.
[0006] Fig. 3 shows fiirther operations of the exemplary procedure of Fig. 2
for secure
signatures, according to one embodiment.
DETAILED DESCRIPTION
OvT le
[0007] Systems and methods for secure signatures are described below in
reference to
Figs. 1 through 3. The systems and methods add security to a digital image of
a hand-written
signature of a person (i.e., an "electronic signature"), by binding or tying
the electronic
signature to specific content of the particular digital document being signed.
As described
below, this also binds a printed version of the electronic signature image
(ink/toner at this
point) to a printed version of the electronic document. To this end, the
systems and methods
generate a first collision resistant hash from a combination of the person's
electronic signature
and content of the electronically signed document. Using a private key of the
person/signer,
the systems and methods digitally sign the collision resistant hash using one
of multiple
possible public-key cryptographic techniques. This creates a public-key
digital signature.
Using a reversible technique (e.g., least significant bit mapping, etc.), the
systems and
2

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
methods insert/embed the public-key digital signature into the bits associated
with the
electronic signature to generate a "secure signature". The secure signature
comprises a
digitally signed fingerprint of the electronic signature together with the
original document
content that can only be decrypted using the person's public key of the
private/public key
pair. This secure signature binds the person's signature to the content. At
this point, the
document can be distributed to end-users for viewing and printing. =
[00081 To verify whether a person's signature is authentically bound/tied to
content of
an electronic or printed (non-electronic) document, the systems and methods
first determine if
the signature is a "secure signature". As described above, a secure signature
includes a
public-key digital signature of a hash value generated from the person's
electronic signature
and the content of the document actually signed by the person. (If the
document comprising
the signature is a paper/printed document, the document is scanned to generate
an electronic
document representing the printed document). If the systems and methods do not
detect such
an embedded public-key digital signature in a digital image of the signature
(i.e., the signature
is not a secure signature), the systems and methods will not verify that the
electronic signature
authentically binds the signer to content of the document. For purposes of
exemplary
illustration, a person's signature could be forged by printing a document
comprising a digital
image of a secure signature, and tracing over the printed version of the
digital image to
generate a "clean" signature. In this scenario, the "clean" signature will not
contain the
programmatically detectable and embedded public-key digital signature of the
signer that ties
the signer's signature to specific content of a document.
[0009J If the systems and methods can extract the public-key digital signature
from
the signature, the signature represents a secure signature. The extracted
public-key digital
signature is then decrypted using the public key (of a private/public key
pair) of the
person/signer. The systems and methods compute a second collision resistant
hash of the
document content (in this example, the document content comprises a digital
image of the
3

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
person's hand-written signature (i.e., an electronic signature) minus the
extracted public-key
digital signature). If the first and second hashes match, then the systems and
methods verify
that the person's signature represents intent by the person to execute the
document; otherwise
such a relationship is not verified.
[0010] These and other aspects for secure signatures are now described in
greater
detail.
An Exemplary System
[0011] Although not required, systems and methods for secure signatures are
described in the general context of computer-executable instructions executed
by a computing
device such as a personal computer. Program modules generally include
routines, programs,
objects, components, data structures, etc., that perform particular tasks or
implement
particular abstract data types. While the systems and methods are described in
the foregoing
context, acts and operations described hereinafter may also be implemented in
hardware.
[0012] Fig. 1 shows an exemplary system 100 for secure signatures, according
to one
embodiment. In this implementation, system 100 includes a computing device 102
such as a
general purpose computing device, a server, a laptop, a mobile computing
device, a tablet PC,
and/or so on. A tablet PC typically includes a touch screen or digitizing
tablet technology
allowing a user to operate the computer with a stylus or digital pen instead
of a keyboard or
mouse. In one implementation, computing device 102 is coupled to an I/O device
104 such as
a graphics tablet that allows a user to provide/draw a hand-written signature
using a stylus (a
pen-like drawing apparatus), similar to the way one draws images with a pencil
and paper.
[0013] Computing device 102 includes one or more processors 106 coupled to a
respective tangible computer-readable storage medium such as system memory
108. A
processor 106 may be a microprocessor, microcomputer, microcontroller, digital
signal
processor, etc. System memory 108 includes, for example, volatile random
access memory
4

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
(e.g., RAM) and non-volatile read-only memory (e.g., ROM, flash memory, etc.)
for
computer-program instructions executable by a processor 106 and program data
generated
and/or used by the computer-program instructions. Such computer-program
instructions are
shown as program modules 110 and program data is shown as program data 112. In
this
implementation, for example, program modules 110 include secure hand-written
signatures
module 114 and other program modules 116 such as an Operating System (OS) to
provide a
runtime environment, public key cryptographic application(s), device drivers,
etc.
[0014] Secure hand-written signatures module 114 (hereinafter often referred
to as
"secure signatures module 114") generates a secure signature 118 that
cryptographically binds
a persons's electronic signature to content of a document 120 (e.g., one or
more pages of
content representing a record, a contract, and memorandum, official
stationery, etc.). An
electronic signature represents a digital image version of a hand-written
signature of the
person (also referred to as the "signer"). Such an electronic signature is
shown as a respective
portion of "other program data" 124. In one implementation, secure signatures
module 114
receives an electronic signature from an I/O device such as a card reader, a
graphics pad, etc.
For example, in one implementation, a person generates an electronic signature
using a
pen/stylus attached to a digital pen pad device (e.g., a graphics pad, a
tablet PC, etc.). In this
scenario, the electronic signature is attached or otherwise logically
associated with
document 120. At this point, the electronic signature represents a willingness
of the user to
execute content of document 120 (i.e., a willingness of the user to be bound
by content of
document 120). In view of this electronic signature, secure signatures module
114 creates a
secure signature 118 that cryptographically ties/binds the user's electronic
signature to content
of document 120 as follows.
[0015] Let D be a bitmap of an original document 120 that was electronically
signed
by a user. Using one of multiple possible known collision resistant
cryptographic hash
functions (e.g., SHA 1, etc.), secure signatures module 114 generates h(D),
which is a

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
collision resistant cryptographic hash ("hash 126") of D. Secure signatures
module 114
generates h(D) from the signer's electronic signature and content of the
document 120. IJsing
a public-key cryptographic application/infrastructure (e.g., RSA, DSA, ECDSA,
BLS, etc.)
and a private key of the user/signer, secure signatures module 114 computes a
public-key
digital signature 122 (R) from h(D) (note that at this juncture the claimed
identity of the
signer is verified by the system using the public-key infrastructure). That
is, secure signatures
module 114 cryptographically signs h(D) to generate R. Secure signatures
module 114 then
generates secure signature 118 by inserting/embedding or logically associating
R (122) into
the bits of the electronic signature. In this manner, secure signature 118
cryptographically
ties/binds the electronic signature to content of document 120. In one
implementation, secure
signatures module 114 inserts/embeds (or logically associates) R(122) into the
image of
electronic signature 118 using a Least Significant Bit (LSB) niap technique to
preserve
readability and legibility of secure signature 11$. In one implementation,
such an LSB
mapping technique creates a faint grayscale image (hash pattern) that encodes
values of R.
This two-dimensional pattern would be nearly imperceptible to an untrained
eye. This two-
dimensional pattern, however, can be programmatically identified and extracted
from a screen
capture or a printed image in a way that could be reconstructed and verified
against document
content.
[00161 In this implementation, secure signatures 114 creates secure signature
118 by
embedding R (122) into an electronic signature such that R is visually
unobtrusive (e.g.,
hidden, or invisible) to a viewer. In this implementation, if a user generates
a printed
document 128 from document 120, the R embedded in the secure signature 118
associated
with document 120 is still embedded and represented in the ink/toner version
of the secure
signature on a page of the printed document 128. As described in greater
detail in the
following section, signature verification module 130 can detect and extract R
from a scanned
6

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
in bitmap (document V) of the printed document 128. Thus, operations of secure
signatures
114 to generate secure signature 118 bind a signer's electronic signature to a
printed page.
[00171 A user verifies whether a signer's electronic signature (encapsulated
by a
secure signature 118) authentically binds the signer to content of a document
(i.e., the
electronic signature has not been forged, cut and paste, etc., into the
document) by interfacing
with secure signature validation module 130 of system 100. The user may be
interfacing with
computing device 102 or remote computing device 136 coupled across a network
132 to
computing device 102. (Network 132 may include any combination of a local area
network
(LAN) and a general wide area network (WAN) communication environments, such
as those
which are commonplace in offices, enterprise-wide computer networks,
intranets, and the
Internet). In one implementation, secure signature validation module 130
communicates a
user interface (UI) and/or webpages to the user. Such a UI and webpages allow
the user to
specify a document D' comprise ari electronic signature and a public key of a
purported signer
of a secure signature 118 comprising the electronic signature. (If the
document comprising
the signature is a paper/printed document 128, the user scans the printed
document 128 to
generate an electronic document D'). For purposes of exemplary illustration,
such a public
key and D' are represented or specified via request 140 from remote computing
device 136.
[0018) Signature verification 1301ocates a bitmap representing the hand-
written
signature portion of D'. In one implementation, a user/operator manually
identifies the bits
associated with signature (e.g., draws a rectangle with a pointing device to
define dimensions
of the bitmap, etc.). At this point, it is not known whether the identified
signature bits
comprise a secure signature 118 or a plain, conventional digital image of a
person's hand-
written signature. (E.g., a forger tracing over a printed version of a secure
signature 118 can
at most generate an electronic signature. Such a forged signature will not
comprise the
programmatically detectable and embedded public-key digital signature of the
actual/real
signer that is in the printed version of the secure signature 118. Secure
signature
7

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
verification 130 attempts to extract a public-key digital signature R (122)
from the bits
associated with the electronic signature. In one implementation, this is
accomplished by
reading off the least significant bits of the pixel intensity values
associated with the identified
portion. If a public-key digital signature R is not present, the electronic
signature in the
identified portion is not a secure signature 118 (i.e., there is no
cryptographic tie of the
electronic signature to content of D') and module 130 notifies the user that
authenticity of the
signature with respect to the content of document D' cannot be verified.
[0019) If a digital signature R is extracted from the electronic signature in
the
identified portion, the electronic signature is a secure signature 118. The
extraction
operations clear/zero-out the pixel intensity values in the identified secure
signature 118,
resulting in a plain electronic signature. Once the electronic signature has
been extracted, the
signature verification follows the digital signature protocol selected for the
scheme. In more
detail, signature validation 130 decrypts the extracted digital signature R
using the received
public-key to identify a first collision resistant cryptographic hash value
h(D) 126. In one
implementation, in the case of an RSA digital signature R, this would involve
exponentiation
of R using the public key of the signer and a check/evaluation to see if the
result matches the
published certificate/key of the signer. Signature verification 130 then
computes a second
collision resistant hash h(D) of D', which comprises the content and the
electronic signature.
(At the point that h(D') is calculated, D' still includes the electronic
signature 118, but the
electronic signature is no longer a secure signature 118 in that it no longer
comprises an
embedded digital signature R).
[00201 Signature validation logic 130 compares the first and second hash
values 126.
If the first and second hash values 126 are the same, signature validation 130
notifies the user
that the electronic signature encapsulated in the secure signature 118
represents a willingness
of the author/signer to be bound to the content of D'. Otherwise, signature
validation 130
8

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
notifies the user that electronic signature does not represent a willingness
of the author/signer
to be bound to the content of D'.
Exemplary Procedure
[0021] Fig. 2 shows an exemplary procedure 200 for secure signatures,
according to
one embodiment. For purposes of exemplary description, operations of procedure
200 are
described with respect to certain components of Fig. 1. In the description,
the leftmost
numeral of a reference number indicates the particular figure where the
component was first
introduced. In one implementation, respective ones of secure signature module
114 and secure
verification module 130 implement the operations of procedure 200. Operations
at block 202
receive an electronic signature from a signatory/signer indicating execution
of a
document 120. Operations of block 204 augment the electronic signature to
generate a secure
signature 118 that cryptographically ties the electronic signature to content
of the document
120. In one implementation, this is accomplished by generating a collision
resistant hash
from content of document 120 and the electronic signature. This collision
resistant hash is
then cryptographically signed using a public-key cryptographic infrastructure
to generate a
public-key digital signature 122. In this implementation, the operations of
block 204 insert
the public-key digital signature 122 into the electronic signature 118 to
generate the secure
signature 118. In this manner, secure signature 118 cryptographically
ties/binds a signers'
electronic signature to specific content of document 120. For instance, a
secure signature 118
cut from an original document and pasted into a different document will not be
cryptographically tied to the content of the different document.
[0022] Operations at block 208 receive a request to verify whether an
electronic
signature of a signer is securely tied/bound to content of a document D'. The
request includes
(or otherwise identifies) the document D' to be verified as well as a public
key of a
private/public cryptographic key pair of the purported document signer.
Operations of block
9

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
210 attempt to extract a public-key digital signature R (122) from the
electronic signature
embedded or logically associated with the received document. If such a public-
key digital
signature R is present in the electronic signature, the electronic signature
is a secure signature
118. The extraction operations remove/strip-out (e.g., zero-out) any
indication R from the
electronic signature. Operations of block 212 determine if a public-key
digital signature R
was found in the electronic signature. If the electronic signature was not
digitally signed,
operations of procedure 200 continue at on-page reference "A" of Fig. 3, where
the user is
notified that electronic signature associated with D' cannot be verified to
represent
willingness of the signer to execute content of the document D'. Otherwise,
operations of
block 214 decrypt the extracted public-key digital signature R (122) using the
public-key of
the signer (the public-key was received in the request associated with
operations of block
202). These decryption operations result in a first hash value h(D) 126.
Operations of block
216 compute a second hash value 126 (i.e., a collision resistant hash value)
from content of
the document D' and the electronic signature, which was stripped of the
extracted public-key
digital signature (please see operations of block 210). At this point,
operations of procedure
200 continue at on-page reference "B" of Fig. 3.
[00231 Fig. 3 shows further operations of the exemplary procedure 200 of Fig.
2 for
secure signatures, according to one embodiment. Operations of block 302
compare the first
and second hash values 126 (please refer to the previously described
operations of block 216
of Fig. 2). As indicated above, the first hash value 126 was the result of
decrypting the
public-key digital signature 122 associated with the secure signature 118
embedded or
logically associated with the document D' (120). The second hash value 126 was
calculated
using a collision-resistant hash function from content of document D' and the
corresponding
electronic signature (the secure signature 118 stripped of the digital
signature). If the first
hash value 126 is the same as the second hash value 126, operations of block
304 continue at
block 306. Operations of block 306 notify the user (i.e., the requester of
block 202 of Fig. 2)

CA 02645213 2008-09-09
WO 2007/127038 PCT/US2007/008678
that the electronic signature associated with the document D' represents
willingness of the
signatory to execute content of the document D'. If the first hash value 126
is not the same as
the second hash value 126, operations of block 304 continue at block 308.
Operations of
block 308 notify the user that the electronic signature associated with the
document D' cannot
be verified to represent willingness of the signatory to execute (e.g., be
bound to) content of
the document. At this point, operations of procedure 200 terminate.
Conclusion
[0024] Although secure signatures has been described in language specific to
structural features and/or methodological operations or actions, it is
understood that the
implementations presented in the appended claims are not necessarily limited
to the specific
features or actions described above. For example, although operations
associated with
secure hand-written signature module 114 (Fig. 1) are shown and described as
encapsulating
operations for signature verification module/logic 130, operations of these
respective program
modules can be independent from one another. In one implementation, for
example,
operations of secure hand-written signature module 114 do not encapsulate
operations of
module 130, but are instead implemented completely independent of such
operations. In one
implementation, for example, operations of module 114 are implemented on a
different
computing device then operations of module 130. Accordingly, the specific
features and
operations discussed above are disclosed as exemplary forms of implementing
the following
claimed subject matter.
11

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: IPC expired 2019-01-01
Application Not Reinstated by Deadline 2013-04-05
Time Limit for Reversal Expired 2013-04-05
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2012-04-05
Inactive: Abandon-RFE+Late fee unpaid-Correspondence sent 2012-04-05
Inactive: Cover page published 2009-01-15
Inactive: Notice - National entry - No RFE 2009-01-08
Inactive: First IPC assigned 2008-12-24
Application Received - PCT 2008-12-23
National Entry Requirements Determined Compliant 2008-09-09
Application Published (Open to Public Inspection) 2007-11-08

Abandonment History

Abandonment Date Reason Reinstatement Date
2012-04-05

Maintenance Fee

The last payment was received on 2011-04-05

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Basic national fee - standard 2008-09-09
MF (application, 2nd anniv.) - standard 02 2009-04-06 2008-09-09
MF (application, 3rd anniv.) - standard 03 2010-04-06 2010-03-05
MF (application, 4th anniv.) - standard 04 2011-04-05 2011-04-05
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
MICROSOFT CORPORATION
Past Owners on Record
DENIS X CHARLES
JASON CAHILL
KAMAL JAIN
KRISTIN E. LAUTER
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Description 2008-09-09 11 594
Drawings 2008-09-09 3 104
Representative drawing 2008-09-09 1 49
Abstract 2008-09-09 2 93
Claims 2008-09-09 6 197
Cover Page 2009-01-15 2 57
Notice of National Entry 2009-01-08 1 195
Reminder - Request for Examination 2011-12-06 1 117
Courtesy - Abandonment Letter (Maintenance Fee) 2012-05-31 1 173
Courtesy - Abandonment Letter (Request for Examination) 2012-07-12 1 165
PCT 2008-09-09 2 88
Fees 2011-04-05 1 66