Check out how digital signature security works and understand the technology involved in the process.

Technology and security of digital signature and electronic documents

In addition to the legal validity of digital signature, which ensures that a document signed electronically is legally valid, there is also the technological aspect involved in the process.Signing electronically using the platform has a high level of security, following strict protocols and some features that we will explain next. These items below ensure that a document, in a virtual environment, cannot be changed or subject to fraud.

Time stamp

Timestamp attests to the exact date and time on which the document was created and/or digitally signed. This stamp is a way to ensure that the document will not change, keeping the veracity of the information, as it has undeniable legal validity. In a physical document, it is not possible to have this information that ensures the data entered, being susceptible to fraud, because there is no way to generate a history of date and time of signature in a paper document (except documents registered in a notary office).

Encryption through Hash 256

Encryption is a bit sequence that aims to identify a file, considered virtually impossible to reverse. Each and every modification to a document generates a different hash. It is one of the leading digital security tools used to protect data and information. With digital signature is no different, since encryption through Hash 256 is used at a high level of complexity, so that the document and/or signature cannot have any type of access or modification by third parties. Basically, it is an alphanumeric sequence that indicates that the document is unique.

Device IP on the network

Through the provider, you can find and identify user access information. The IP of the computer or device used to sign is also used to verify the proof and authenticity of the digital signature. In physical environment, anyone can defraud a signature; unlike the access to an email or IP address, where the chances of intrusion are minimal.

Digital certificate validation

For specific types of documents, you must have a validated digital certificate. This certificate is an electronic identity that gives legal validity for actions in the virtual world. It is a document that can be used by individuals and legal entities who seek to formalize businesses virtually, such as signing documents digitally. Therefore, in short, the digital certificate functions as an electronic CPF (social security number) or CNPJ (company registration number).

Access login

This is yet another layer of security that filters who can access the document through email address and password. Unlike the digital platform, in which it is possible to release access of a document to specific users, in the physical environment the document goes through several hands until it reaches the recipient, losing confidentiality and becoming more vulnerable.

Virtual storage

All electronic documents are stored on servers with a high level of robustness and security, which ensures peace of mind for participants, confidentiality of information and centralization of data. In the case of traditional paper documents, the mere fact that they are printed brings numerous risk factors, such as loss or delay, for example.

Contraktor Authenticity Checker

Quickly compare and verify that the document has been validated via Contraktor!

Contraktor's authenticity verification technology ensures transparency, immutability and irrevocability for electronic or digital signature transactions.