...

Design
Alternative

Registration

Credential

Credential
Delivery

Signing
Technology

Tamper
Evident
Packaging

 

Ease-of-use

Portability

Cost

Accountability

Theoretical PKI alternative

In-person proofing at USPO

PKI private key

In-person

Digital Signature: document hash is encrypted with private key.  Requires some type of reader to input the key, and, client software to execute the hashing and encrypting

Store text of document and digital signature; this combination is tamper-evident by design

 

Fail: complex and mysterious

Fail: reader required

Fail: Complex,  mysterious, many ways to fail

Reader required

Significant cost of person-proofing and certificate issuance

Pass: strong Strong confidence in identity and credential, however, custody of credential not guaranteed

USDA Level 2 Access

Create online profile, then appear in-person at USDA Service Center with government-issued photo ID to activate level 2 credentials

User ID and password

Customer specified credentials are electronically activated by USDA Service Center employee

tbd

tbd

 



 

Pass: strong Strong confidence in identity, however, custody of credential not guaranteed

FedEx-like digitized signature: holographic signature using stylus on a digitizing pad

Signature would not necessarily be electronically associated with the registrant

Image of a holographic signature

None required

Signatory signs a holographic signature on a digitizing pad while the digitizing pad is under the control of agency's e-signature software

Package signed document and image of holographic signature; requires external "seal" to make tamper-evident

 

Pass: familiar Familiar and understandable

Fail: stylus and Requires digitizing pad required, stylus, and custom software required at client device

Fail: Significant cost of stylus and digitizing pad

Pass:  characteristics Characteristics similar to traditional signature

RSA SecureID¿

Configurable per business requirements; could be fully online using shared secrets

Choice of 5 hardware authenticators or software for cell phone or PDA

Hardware authenticators require physical delivery; software authenticators "seed" could be delivered electronically

Signatory signs with a "something you know" pin or password, and, a one-time use token code generated by their authenticator

Package signed document and authentication metadata; requires external "seal" to make tamper-evident

 

Pass: dedicated Dedicated devices mask deep complexity

Fail: dedicated Dedicated device must be present at signing

Fail: Significant cost of dedicated device and licensing

Pass: strong Strong confidence in identity and credential, good confidence in custody of credential

NPS e-signature

Online registration, identity validation via shared secrets including SSN

Username and password

Online issuance

Signatory signs with a "something you know" username and password

Package signed document and authentication metadata; requires external "seal" to make tamper-evident

 

Pass: similar Similar to common e-commerce transactions

Pass: only Only "something you know" required

Pass: clearly Clearly less expensive than the former paper process

Pass: moderate Moderate confidence in identity, credential, and custody, but may be adequate to mitigate moderate risk

HMS Permits:
no confirmation of identity

Online registration at http://www.hmspermits.gov/

Permit number

Online issuance of permit

Not called a signature, but does include "I am authorized" checkbox

Typical transactional database controls

 

Pass: similar Similar to common e-commerce transactions

Pass: only Only "something you know" required

Pass: clearly Clearly less expensive than the paper process

Pass: little Low confidence in identity and custody, but may be adequate to mitigate very low risk