Security as a focus: how Clicksign stands out with its authentications
The use of technology brought two sides of the same coin into the hands of professionals and companies. If on the one hand there are all the various benefits provided by technological advances, on the other side are the various precautions necessary for data protection and information security.
In the context of electronic signatures, the need for robust security measures is even more evident, considering that signed documents may contain sensitive data for companies. In addition, validating the identity of those who sign these documents is also essential, especially to guarantee the legal validity of what is signed.
That's where authentications come in, which are ways to collect evidence of the signer's identity while signing a document.
At Clicksign, different authentication methods can be combined to create security measures that not only protect against threats, but also meet user expectations, whether for convenience or ease of use.
In this article, you will understand the signer authentication options available on Clicksign and how to choose the best authentication when sending and signing your document. It's worth your read!
Clicksign Authentications
Next, learn about the authentications available on Clicksign and make your subscription process even more secure.
But first, remember: when choosing an authentication, you can also combine more than one option, using authentications together and raising the security levels of your document.
Tokens via email, SMS and WhatsApp
The token is a temporary verification code, which can be sent to the subscriber's email, WhatsApp or SMS, acting as a double factor of authentication and confirming the identity of the signers. This authentication is intended to be fast and simple, and easy to use on a daily basis.
Digital Certificate
The digital certificate is a type of electronic identity whose main function is to prove the identity of a person or company through electronic means. Regulated and issued by ICP-Brazil, data protection is provided by means of cryptographic keys sent in pairs to each holder.
There are several types of digital certificates. At Clicksign, it is possible to sign documents with digital certificates in models A1 and A3, both of individuals, which can be stored on local devices or in the cloud.
Dynamic Selfie
The dynamic Selfie allows you to validate that the person signing the document is a real person, by capturing some movements, facial expressions, and elements of the images. Thus, it is possible to guarantee that it is not a static image or a previously recorded video, but of a real person, capturing the photo at the time of signing the document.
Official document and Selfie with document
When authenticating by an Official Document, those who sign must take a photo of their own document, so that the image composes the Log of the signed document (i.e., the record of the signing process).
On the other hand, in the selfie with the document, the signer must take a photo of their own face, but must also show an official document.
The selfie with a document is very similar to authentication with an official document, but while in one the signer must take a photo showing his face and the document, in the other he must record only the document in the image.
Handwritten Signature
With the handwritten signature, your signers draw their own signature as if they were writing on physical paper, but digitally on a screen. It is further evidence of the identity of the person signing the document and can be compared with other documents or with the signer's identity document, for example.
Facial Biometry
Facial biometrics is another way of verifying the identity of the person signing, comparing a photo of the signer's face with a photo of their document. Those who sign must take a photo of their face and identification document (such as ID or CNH). Images are automatically compared, increasing the security of the subscription. This authentication can be done by cell phone or computer, and the images are recorded in the document log, providing a greater degree of legal security for signatures.
Pix
The Pix is an innovation in its own right, moving the Brazilian market since it was created. What you may not know is that it is possible to use this banking functionality as document authentication.
By choosing this authentication, you can confirm the identity of the person who signed your document by having them carry out a symbolic bank transaction (a Pix of R$0.01), which compares the data and validates the identity of that signer. Fast, simple and technological.
Rubric
This authentication is a way to validate your documents and also to confirm that your signers agree with the information contained in the content. It's all quite simple: the signer defines their own initials, which must be inserted on the pages of the document, and that's it. With this, your document will have a more complete Log and you will have double confirmation from all those responsible for the subscription.
Proof of address
As the name itself says, in this authentication you request proof of your signer's address as a way to prove their identity. This is yet another option to provide even more security when verifying the identity of the signers and which is also recorded in the document log.
Device IP address
With this functionality, it is possible to delimit access to the subscription platform based on a determined IP distance. That way, you can keep access freed up only to authorized IPs.
Shared location
The shared location is also made during the subscription, when the signer, already at the data confirmation stage, shares their current location. This information is recorded directly in the document log, identifying the signer's latitude and longitude at the time of signing.
What authentication should you use for your documents?
Choosing the authentication that best suits your business needs depends directly on the level of security you seek. There are a range of options that meet different security requirements, whether using simpler methods, such as tokens via email, or even advanced solutions such as facial biometrics.
Each type of authentication has its own advantages and applications, and its role is to know how to evaluate the particularities of your business and the sensitivity of the documents involved in order to define the most effective authentication strategy. As you have seen, a great strategy is to combine more than one authentication, making your processes more secure with the options mentioned above.
Clicksign and its authentications
At Clicksign, you can find the authentications listed in this article and many other features and features that add to the security of your documents. Learn about our solutions and put secure electronic signatures into practice in your company!