Persistent Data Integrity (PDI) A Proposal For A New Document Security Standard How Secure signatures function currently. A typical document passes through multiple eSignature and document management platforms over the course of its existence. To be fully secure, the audit trail of this document must be accessible across all platforms, and maintain this accessibility in both the analog and digital domain. This creates challenges that current platforms and systems struggle to address. Typical Use-Case Scenario Dootloop DIGITAL SELLER X Docusign DIGITAL X X BUYING AGENT Paper X Signature BUYER Security breakdown Secure ANALOG X X X X LISTING AGENT ESCROW SELLER BUYER Unsecure CONCLUSION: In this example, the document security fails as soon as the document passes into Still From secure despite the analog, or printed, domain. here, image editing software can be used to alter terms, signachange of platform tures, dates and even parties participating, without any way for downstream participants to check data veracity. Typical Use-Case Scenario with PDI PDI Signatory DIGITAL BUYING AGENT Docusign DIGITAL ESCROW LISTING AGENT BUYER Paper X Signature ANALOG Still secure despite change of platform Secure SELLER SELLER BUYER Unsecure CONCLUSION: When a document is generated within a PDI compliant framework, document security is sustained regardless of downstream platform or domain paths. Persistent Data Integrity (PDI) 2 What is PDI? Persistent This security technology persists on a document across any and all platforms and media, both analog (printed) and digital, with no degradation in the level or nature of data surety. Data This technology encapsulates user-generated materials in the form of signatures and / or other document specific content. Integrity This technology insures the preservation of data in a sound, or pure, or perfect condition using SSL, UETA, KBA, geo tagging, IP address registration, device ID tagging, cell number lookup, TXT based challenge / response, time / date stamping and other patent pending security protocols to achieve the highest level of data surety. Persistent Data Integrity (PDI) 3 What form does PDI take on a document? 86 • A score (1 to 100) generated against the level of confidence the issuing entity has in the surety of the document data. • A scannable code. What are the 3 categories of PDI validation? What form does PDI take when validating data surety? How is the PDI score created? • Signature surety – who, when, • A display of the original document • A PDI enabled system includes some where, and with what device as a digital file. or all of the technology categories not- • Document surety – physical • An abstract of all data committed to reproductions of secured documents that document using a PDI enabled • Metadata surety – digital abstract of user generated document data system (e.g. signatures, name, address, purchase price etc.) ed under the INTEGRITY bullet above. Each of these categories is assigned a weighted number. The PDI score for a given page of a given document is generated based on the extent to which • A certificate listing security data security data in all categories was collected during the creation of the collected and verified at commission. document and the commission of the data, up to and including meta data such as photo, video and bio metric IDs. Persistent Data Integrity (PDI) 4 How is PDI Different from Existing Security Protocols? There are two separate authentication domains to be considered when validating a document: Signatory Authentication, and Data Authentication. In both cases, PDI offers a standard of security not available within non-PDI enabled systems. 1) Signatory Authentication opportunities. With a PDI enabled system, photo, video and bio-metric IDs such as finger prints are always accessible. This means that a gatekeeper Determining the identity of a document signer, technology such as KBA, which becomes the sole and separately of a document creator, is currently purveyor of surety and which is available only once effected using well established, but problematic, per transaction, can be supported or replaced by technologies. The existing gold standard for this real time in person authentication – using the domain authentication is KBA, or Knowledge Based photo or fingerprint of a document signer accessed Authentication. The problem with KBA is that it through a PDI system, signer authentication can is accurate only insofar as existing databases hold confidentially be established at any stage of the data about an individual signer. There are non transaction. trivial cases where KBA will not provide acceptable security, for instance for a younger signer, who may not have historical address, billing or financial services information, or for foreign signers whose historical data might not be accessible in domestic systems. In these and other scenarios, KBA systems will fail. Where PDI enabled systems truly outpace other security protocols is when the documents in question are not digital but analog. After a document is printed, the existing standard digital authentication trail is at best extremely difficult to resurrect and at worst entirely lost, whereas PDI security extends into the analog realm as easily and securely While a PDI enabled system includes KBA, the fact as it does into the digital. This is the PERSISTANT that the data associated with a signer is persistent nature of PDI. creates deeper, more complete authentication 2) Data Authentication While some effective forms of Signatory Authen- verify that the data which belongs on the document is actually the data currently viewable. tication exist, there is very little in the way of Data PDI enabled systems create instant and direct ac- Authentication available at the consumer level. cess to the original document. Additionally, more We know of no standardized set of procedures advanced PDI enabled systems create an abstract established in this domain. Ironically, analog Data of the data on the document to quickly determine Authentication outpaces digital authentication, the veracity and accuracy of the version being since a paper form can be enveloped, sealed and audited. And again, due to the PERSISTANT nature dated, and reliably identified as an original, while of PDI, this access is equally available whatever the in the digital space, once a document has been media, whether printed or digital, of the docu- printed, edited by hand, scanned, edited digitally, ment. This is the great, over arching benefit of PDI sent through multiple signature systems such as – security conferred equally to digital and non-dig- Docusign and Digital Ink and printed again, it ital documents. can be impossible to backtrack to the original and Persistent Data Integrity (PDI) 5 The NuOffer PDI Implementation + The NuOffer implementation of PDI covers all documents and signatures created in the course of writing, submitting, responding to and accepting an Agreement to Purchase real property originating within the system. In the future this implementation will be extended into the post-acceptance, and eventually into the post-close phases of this transaction. The present document deals only with the PDI and security features of the NuOffer system, and not with the offer writing, transaction Persistent Data Integrity (PDI) nuoffer management, CRM, vender marketplace or broker tool elements. These security features to be addressed revolve around two distinct data subsets; offer terms and signatures. Within the NuOffer system a signature is first Composed, then Enabled. A signature is Composed with a finger or a stylus on a touch sensitive surface, and Enabled when it is applied against a given document. A single signature can be Composed only once, but may be Enabled multiple times. The device on which the signature is Enabled is referred to as the Enabling device. 6 When is PDI logged in the NuOffer system? 1) A PDI snapshot is taken at the time a signature is Composed. Signatures are Composed in the NuOffer system: Signature • By a client on an agent’s device • By a client on client’s device (phone) • By an agent on agent’s device 2) A PDI snapshot is taken whenever signatory permission (legal release to Enable signatures) is granted from a device other than the device that will be used to physically Enable a signature. This is NuOffer’s Txt2Sign technology, requiring a client to grant permission, via TXT, for a given document to be signed if the Enabling device belongs to the agent. 3) A PDI snapshot is taken whenever a signature is Enabled on a document. Signatures are Enabled in the NuOffer system: • By a client on an agent’s mobile device • By a client on client’s device (phone) • By an client on a desktop computer 4) The user generated data (offer terms) attendant upon any document drafted or submitted in the NuOffer system is logged in association with all Enabled signatures from all participants at every juncture. How is PDI accessed in the NuOffer system? NuOffer is a complete implementation of the proposed PDI standard. This means that all three categories of PDI validation are provided: • Signature surety – who, when, where, and with what device • Document surety – physical reproductions of secured documents • Metadata surety – digital abstract of user generated document data There are two links in the data access chain: 1) A QR Code is assigned to every page of every document which leads to a unique Secure Document URL 2) The Secure Document URL allows permission-based access to the PDI information for that page of that document. • Scanning the code, either through the native NuOffer application or any other commercially available QR code scanner loads a log in URL. continued next page . . . Persistent Data Integrity (PDI) 7 • All registered offer participants are granted full access to all pages of a document from the QR Code of any individual page of a document after successful log in. These can include but are not limited to: Listing Agent, Selling Agent, Buyer, Buyer Two, Seller , Seller Two, or any non-signatory who has been included on the Submit page of the NuOffer app. • Along with all global PDI information, the QR code on a given document facilitates ID tracking for the document recipient, so while a single Purchase Agreement might be copied and emailed to a buyer, a seller, a seller agent etc., all PDI information is identically logged except the document recipient. Thus if the document is reproduced and distributed by any given recipient, either digitally or in a printed form, origination data is available to audit. • By default, non-signatories accessing a Secure Document URL are allowed to see only the digital reproduction of the page that has been QR scanned, not the signatory surety or the metadata surety. This setting can be adjusted. Working With Secure Document URL Pages 1) Any signatory has the ability to forward this document to any other signatory or non-signatory by scanning the QR code for a given page or document and entering contact information. In this case, a new QR Code is generated reflecting the ID of the new recipient. 2) Agent signatories have the ability to forward pages and documents from Secure Document URLs to their clients for signatures. This allows an agent to present a printed, completed document for review and quickly Enable signatures on those pages digitally as the client approves them. Persistent Data Integrity (PDI) 8
© Copyright 2024 ExpyDoc