Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:31 PM
Dark Reading
Dark Reading
Products and Releases

DocuSign Adds Two-Factor Biometrics To E-Signature Service

Integrates Authentify's automated phone call and voice capture authentication process into electronic document signature service

CHICAGO, SEATTLE – June 30, 2010—Technology partners, DocuSign and Authentify, today announced that DocuSign has integrated Authentify’s automated phone call and voice capture authentication process into the DocuSign electronic document signature service. This authentication option is available now with the DocuSign Spring ’10 release.

According to Tom Gonser, DocuSign founder and chief strategy officer, the addition of the two-factor biometric telephone and voice authentication process further strengthens the signature and audit trail without adding complexity to the eSignature process. “All the recipient needs to do is answer the phone call and follow a simple instruction on the computer screen. It’s a very natural extension of our electronic signature process,” said Gonser. “The synchronization of the Web and telephony process requires users to interact simultaneously during the signing engagement. The entire transaction is documented, including captured authentication data during each stage until completed. The end result is a transaction backed by a solid, defensible audit trail.”

The DocuSign telephone biometric authentication process is a flexible solution that is fully integrated into its eSignature platform. This optional DocuSign feature is sender and signer friendly, and available at a nominal charge. DocuSign users prepare documents for signature in the online DocuSign Console, click on Authentication and enter the recipient’s phone number. When the recipient e-signs the document using DocuSign, the process triggers an automated telephone call powered by Authentify to the specified recipient phone number, collects a spoken consent and builds a biometric authentication record for ironclad non-repudiation of the signature. The biometric voice print can be used much like a fingerprint in the event of a challenge.

“Authentify makes millions of secure phone calls on behalf of our clients and captures the audit trail from both our servers and the telephone network,” said Peter Tapling, president and CEO of Authentify. “We can create a digital record of a signature with a voice recording to prove, without question, its authenticity and ensure there is no question over the party’s intent. If you say the words “I Agree” it’s hard to then later try and make the case that you didn’t.”

The optional Authentify biometric authentication option is now available with the release of DocuSign Spring ’10. Details can be found at the DocuSign website at http://www.docusign.com/products/docusign/whats_news.php.


About Authentify, Inc.

Authentify, Inc. pioneered interactive telephone-based, out-of-band authentication services introducing its services in 2001. These authentication services enable organizations that need strong security to quickly and cost-effectively add 2-factor or 3-factor authentication layers to user logon, transaction verifications or critical data changes such as adding a payee to an e-pay or wire account. Authentify markets to financial services firms, corporate security professionals and e-merchants who want to limit fraud on their sites.

Authentify implemented its first biometric application for a Midwestern regional bank in 2004. Visit Authentify at www.authentify.com or call 773-243-0300 for more information.

About DocuSign, Inc.

DocuSign, Inc. is the leading provider of on-demand software services for electronic signature. DocuSign empowers individuals, small businesses and global enterprises to operate faster and more efficiently, with greater profitability, enhanced security and compliance. DocuSign is the only Web-based service to securely automate and control the entire electronic document signing process. DocuSign employs the SaaS eSign industry's only enterprise class SAS-70, fully redundant data center delivering 99.993% uptime for customers over the last 32 months. To date, more than 79 million signature events have been executed using DocuSign. In addition, DocuSign is the official and exclusive provider of e-signature services for the National Association of REALTORS' 1.1 million members, under the REALTOR Benefits' Program.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-12
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and fro...
PUBLISHED: 2021-05-11
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
PUBLISHED: 2021-05-11
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11 and before 6.9.12, where a division by zero in WaveImage() of MagickCore/visual-effects.c may trigger undefined behavior via a crafted image file submitted to an application using ImageMagick. The highest threat from this vulnerability is to ...
PUBLISHED: 2021-05-11
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero ConvertXYZToJzazbz() of MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker and processed by an application using ImageMagick. The highest threat from this...