Customer Benefits
As simple as signing on paper Documents cannot get lost during delivery Signatures or attachments cannot be forgotten Socially accepted handwritten e-signatures require no changes in user habits Reduced fraud through bullet-proof security and authentication even in real-time Seamless and fast integration in existing application and document flows Accelerates POS processes, freeing up time for up-selling & cross-selling activities
Functions
Control and govern all steps in the completion and signing process of contracts Supports pressure sensitive pens for Android and iPad for the most natural signing experience, palm protection and high-quality signature recording Based on open PDF standards, with no proprietary e-signature technology Leading biometrical signature verification in realtime, with self-learning reference profiles Highly scalable, robust server platform with straightforward server-side integration Complete and sign documents fully offline
www.xyzmo.com
Page I 1
www.xyzmo.com
Page I 2
verification, the false acceptence/rejection rates it achieves are in the low one-digit percentage range. Its selflearning algorithm enabels the system to stay up to date with changing signing habits over time. In addition, it has the advantage of lacking the invasive nature of other biometrical authentication methods such as fingerprint, face, or retina scan, all of which do not allow the simple switch to a different biometric signature in case the data is stolen.
Biometric encryption
The biometrical signature data is encrypted asymmetrically using a public key directly while recording. Reading the signature for verification purposes is only possible through decrypting it with the corresponding private key, which can either be stored offline, e.g. at a notary, or when required online in e.g. a High-Security Module (HSM).
Document binding
The biometric signature is always securely bound to a unique document. Its fingerprint (hash) is encrypted together with the biometrical signature data making copy/paste attacks impossible.
Integrity protection
Once a handwritten signature is captured, a digital signature is also applied, which turns the document into a sealed PDF, making undetectable changes of the document content impossible.
Straightforward Integration
Front-end App
Either use the standard SIGNificant App or integrate the apps functionality and UI views into your own app through the SIGNificant SDK. Moreover, you can easily adapt the default color schema of the app to your corporate design.
www.xyzmo.com
Page I 3
www.xyzmo.com
Page I 4