Corporate Blog

Today the the Digi-Sign Affiliates, Resellers & Partners [ARP] Network reached the 50 partner mark and now has partners in most of the major countries around the world. Digi-Sign is proud to support the ARP network that now serves customers from California to Calcutta.

There are different methods which are used to authenticate a document which contains a digital signature. Using a user name and password is one option, but is only provides a single level of security. If anyone discovers your user name and password, they can access the document and alter it. If using this method to digitally sign documents, it is wise to use two factor authentication, which requires a second level of authentication after the user name and password are entered.

Authenticating a Digital Signature Involves Two Processes

Working with public keys, private keys, certificate authority and other security measures can seem confusing. Putting together how these items work can sometimes lead to people having more questions than when they started. Rather than getting caught up on all the details, you can understand how public key infrastructure works by keeping examples simple. Also remember that there is a standard used for generating and using these security items, which is called the X509 PKI standard.

How X509 Works Depends Upon the Type of CA You Use

Public key infrastructure or PKI is a type of cryptography used to protect data and information in public domains where there is little or no security. For example, the Internet is a public domain which is open for everyone. Most people can access all different types of websites, data and information. Unless you use some type of security, like requiring a user name, password and a second form of authentication, anyone can access your website and date contained online.

Accessing Your Banking Information Online Uses PKI

An electronic signature is a form of authentication used on important electronic documents. The easiest way to compare an e-signature is to compare it to a paper document. On a paper document, you will find the signature of the issuer. You can also find signatures of witnesses or a notary public. These secondary signatures tell you that the identity of the person signing the document has been verified and the document is authentic.

You Need to Encrypt an Electronic Signature to make it Authentic

There are certain types of electronic documents which you will want to encrypt and use a digital signature. This type of encryption ensures that the electronic document is authentic, which means that it was not tampered with or altered in any way before you received it. In order to keep the document safe, there are different methods for applying the signature to the document and encrypting it. Once the document is received, it is unencrypted using the same method.

A Digital Signature Can Be Encrypted Using a Private Key

Single sign on authentication can help reduce the number of password resets required by users. When users are able to use the same password for accessing their computer, network and other applications, it cuts down on requests for password resets. However, this is not always the best way to run a secure network. Adding a second layer of authentication in the form of a USB token can increase the security of your network.

Single Sign on Authentication Is Not Secure for Online Systems

As organizations have become more aware of security issues and concerns, they have changed the ways employees are allowed to access information. Some organizations have done away with single sign on authentication. Passwords can no longer be simple words, but now often need to contain at least on capital letter, numbers and even a special character. Organizations often will require that users have different user IDs and passwords and cannot use the same ID or password for multiple applications.

You Can Still Use a Single Sign On by Adding Two Factor Authentication

An X509 certificate is used in public key infrastructures as the standard used by all organizations for providing security to electronic information. The standard was created as a means to allow different computers to be able to talk to one another without having to worry about certificate compatibility issues. The X509 standards also outline the formats used for other types of certificates and public keys.

An X509 Certificate Contains Many Different Parts

When you use public keys and private keys, there are several components which allow this type of security to work. In order to use a public key it requires a certificate authority which has embedded within it a root certificate. The root can be either unsigned or signed and will affect how the public key functions with the public key. Certificates which are unsigned often prompt the user to choose whether they want to trust the certificate.

You May Use a Root Certificate with Two Factor Authentication