System and method for rules-based control of custody of electronic signature transactions

Information

  • Patent Grant
  • 9230130
  • Patent Number
    9,230,130
  • Date Filed
    Friday, March 15, 2013
    11 years ago
  • Date Issued
    Tuesday, January 5, 2016
    8 years ago
Abstract
Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of electronic signature documents. In one embodiment, an electronic signature document may be associated with custody transfer rules that facilitate transfers of custody of an electronic signature document from one user or party to another. A custody transfer may results in a transfer of rights or capabilities to operate upon (e.g., modify, view, send, delete) an electronic signature document and/or its associated data. A custody transfer rule may be trigged by the occurrence of a particular event, such as the receipt of an electronic signature.
Description
FIELD OF THE INVENTION

The present disclosure relates to systems and methods for electronic signatures and, more particularly, to systems and methods for rules-based control of custody of electronic signature documents.





BRIEF DESCRIPTION OF THE DRAWINGS

Preferred and alternative examples of the present invention are described in detail below with reference to the following drawings:



FIG. 1 illustrates an example block diagram of an example embodiment of an electronic signature service;



FIG. 2 is a flow diagram of an example rules manager process according to an example embodiment; and



FIG. 3 is a block diagram of an example computing system for implementing an electronic signature service according to an example embodiment.





DETAILED DESCRIPTION

Embodiments described herein provide enhanced computer- and network-based methods and systems for facilitating electronic signatures. Example embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of documents and corresponding electronic signatures. Using the ESS, a first user (a “sender”) can provide or upload a document to be signed (“a signature document”), while a second user (a “signer”) can access, review, and sign the uploaded document.


Some embodiments of the ESS facilitate rules-based control of custody of electronic signature documents. In one embodiment, an electronic signature document includes or is associated with custody transfer rules (or simply, “custody rules”) that govern, control, or facilitate transfers of custody of an electronic signature document from one user or party to another. A custody transfer typically results in a transfer of rights or capabilities to operate upon (e.g., modify, view, send, delete) an electronic signature document and/or its associated data (e.g., history, form data, signature data). In some embodiments, when an electronic signature document changes custody, a first party associated with the document (e.g., that created, edited, or sent the document) loses one or more previously held rights to the document while a second party gains those and possibly other rights. For example, upon custody transfer, a first user (e.g., the initial document sender) may lose the right to edit or delete the document, while a second user (e.g., a manager) may gain the rights to view, edit, and delete the document. The first user may in some embodiments or configurations retain some rights, such as “read only” access allowing the first user to view the document.


Custody transfer rules may also specify conditions under which transfers of custody are to take place. For example, a sales organization may have two distinct types of users: sales representatives and sales managers. A sales representative may create an electronic signature document (or clone or copy an existing one) that represents a sales contract with a customer. Such an electronic signature document may be associated with custody transfer rules that cause custody of the document to transfer from the sales representative to the sales manager upon the occurrence of one or more events, such as when a customer completes an electronic signature, thereby closing a sale or otherwise completing a transaction. Other conditions may be specified, such as when the sales representative initially sends the electronic signature document to the customer, when a customer indicates refusal to sign the electronic signature document, when a specified amount or period of time passes, or the like.



FIG. 1 illustrates an example block diagram of an example embodiment of an electronic signature service. In particular, FIG. 1 depicts an ESS 110 utilized by a sender user 10 and a signer user 11 to perform an electronic signing of a signature document 20. FIG. 1 also depicts a transferee 12 who receives custody of the signature document 20.


In the illustrated scenario, the sender 10 operates a sender client device 160 in order to provide (e.g., upload, transmit) an electronic document 20 (e.g., an invoice, contract, or agreement) to the ESS 110, where it is securely stored. The electronic document includes or is associated with custody rules 21 that are configured to cause custody of the document 20 to transfer from the sender 10 to the transferee 12, possibly upon the occurrence of one or more conditions. In some embodiments or configurations, the sender 10 and transferee 12 may be in or work for the same organization. For example, the sender 10 may be a sales representative while the transferee 12 may be a sales manager or an in-house attorney who reviews and records sales contracts. In other situations, the sender 10 and transferee 12 may work for distinct organizations or entities.


The sender 10 and/or some other user (e.g., an administrator) may configure the document 20 and/or the custody rules 21. For example, an administrator may interact with a user interface configured to facilitate the specification of custody rules and associated conditions. The custody rules 21 are then stored by the ESS 110 in association with the document 20. In this example, the custody rules 21 are configured to cause custody of the document 20 to transfer to the transferee upon signature by the signer 11. At this time, the sender 10 may further modify, configure, or customize the document 20, such as by changing price and quantity terms, party names, dates, and the like.


After the sender 10 configures the document 20 to his satisfaction, the signer 11 may access the document 20. In one embodiment, the sender 10 notifies the signer 11, such as by causing the ESS 110 to send to the signer 11a message (e.g., an email) that includes a reference (e.g., a URL) to the document 20 stored by the ESS 110. As another example, the sender 10 may directly include the document 20 in an email or other message transmitted to the signer 11. As a further example, the document 20 may be automatically presented to the signer 11 as part of a transaction. For example, an e-commerce system may cause the document 20 to be presented or transmitted to the signer 11 during or as part of a transaction for a good/service purchased via the e-commerce system.


Typically, the signer 11 operates a Web browser or other client module executing on the signer client device 161 to access and review the document 20 via the ESS 110. For example, if the signer 11 receives an email that includes a link to the document 20, the signer can click the link to visit the ESS 110 in order review and sign the document 20. If instead the signer 11 receives the document 20 itself directly from the sender 10, opening the document will also cause the user to visit the ESS 110 to provide the required signature information. When the document 20 and related data have been reviewed (and possibly modified) to the satisfaction of the signer 11, the signer attaches (or provides an indication or instruction to attach) his electronic signature to the document 20.


Once the signing has been completed, the ESS 110 causes custody of the document 20 to change from the sender 10 to the transferee 12. At this time, the sender 10 may lose one or more rights, such as the right to view, modify, or delete the document 20. In addition, the transferee 12 may gain one or more rights, such as the right to view, modify, or delete the document 20. The transferee 12 can access and perform various operations (e.g., view, modify, delete) via the transferee client device 162. Custody transfer rules may specify custody chains or sequences of arbitrary length (e.g., more than the two parties shown in this example). For example, custody of a document may transfer from a sales representative to a sales manager and thence to an in-house attorney.


In some embodiments, the document 20 may be associated with an envelope or other data structure that functions as a container that includes the document 20 (or a reference thereto) along with meta-information, including signature information, sender information (e.g., names, addresses), recipient/signer information (e.g., email addresses, names), and the like. Custody rules may be configured to manage access to an envelope and its related information. For example, one custody rule may specify that once the sender 10 has transferred control to the transferee 12, the sender 10 may view but not modify envelope information including the document 20. The transferee 11, in turn, may receive additional rights, such as to delete the document 20, view information added to a form associated with the document 20, clone the document 20, or the like. In some embodiments, a user may upload a file that contains information about multiple documents for which custody is to be transferred, so as to effect a bulk transfer from one party to another.



FIG. 2 is a flow diagram of an example rules manager process 200 according to an example embodiment. The process of FIG. 2 may be performed by the ESS 110.


The illustrated process begins at block 202, where it associates a custody transfer rule with an electronic signature document. Associating a custody rule may include storing data structure or record that relates the custody rule with the document. The custody rule itself may be a data structure or record that includes indications of the document, users impacted by the custody rule, conditions or events that trigger custody transfers, access rights impacted by the rule, or the like.


At block 204, the process, in response to occurrence of an event, transfers custody of the document based on the custody transfer rule. Transferring custody may include removing one or more access rights from the first user, and in turn, granting those access rights to a second user. Different kinds of events may trigger the transfer operation, including the presentation (e.g., viewing), receipt, signature, or other operation upon or with respect to a signature document. Some events may be time based, so that custody transfers are triggered upon a passage of time or on a specified calendar day.


At block 206, the process stores information about the transfer of custody of the electronic signature document. Storing information about custody transfer may include updating a data structure or record to reflect a new document owner, to remove rights from one user, to grant rights to another user, or the like. After block 206, the process ends.


The process may perform additional or different operations. In some embodiments, the process may also enforce access rules governed by the custody rule. For example, when the process receives an indication that a user is attempting to perform some operation (e.g., view, edit, delete) with respect to the signature document or its meta-data, the process may allow or disallow the operation based on a determination whether the user has the appropriate access rights to perform the indicated operation.



FIG. 3 is a block diagram of an example computing system for implementing an electronic signature service according to an example embodiment. In particular, FIG. 3 shows a computing system 100 that may be utilized to implement an ESS 110.


Note that one or more general purpose or special purpose computing systems/devices may be used to implement the ESS 110. In addition, the computing system 100 may comprise one or more distinct computing systems/devices and may span distributed locations. Furthermore, each block shown may represent one or more such blocks as appropriate to a specific embodiment or may be combined with other blocks. Also, the ESS 110 may be implemented in software, hardware, firmware, or in some combination to achieve the capabilities described herein.


In the embodiment shown, computing system 100 comprises a computer memory (“memory”) 101, a display 102, one or more Central Processing Units (“CPU”) 103, Input/Output devices 104 (e.g., keyboard, mouse, CRT or LCD display, and the like), other computer-readable media 105, and network connections 106 connected to a network 150. The ESS 110 is shown residing in memory 101. In other embodiments, some portion of the contents, some or all of the components of the ESS 110 may be stored on and/or transmitted over the other computer-readable media 105. The components of the ESS 110 preferably execute on one or more CPUs 103 and manage electronic signature processes including custody transfers as described herein. Other code or programs 130 (e.g., an administrative interface, a Web server, and the like) and potentially other data repositories, such as data repository 120, also reside in the memory 101, and preferably execute on one or more CPUs 103. Of note, one or more of the components in FIG. 3 may not be present in any specific implementation. For example, some embodiments may not provide other computer readable media 105 or a display 102.


The ESS 110 includes a service manager 111, a user interface (“UI”) manager 112, an electronic signature service application program interface (“API”) 113, a rules manager 114, and an electronic signature service data store 115.


The ESS 110, via the service manager 111 and related logic, generally performs electronic signature-related functions for or on behalf of users operating a sender client device 160, a signer client device 161, and a transferee client device 162. In one embodiment, a sender operating the sender client device 160 provides (e.g., transmits, uploads, sends) a document to be electronically signed to the ESS 110. The ESS 110 stores the document securely in data store 115. Secure document storage may include using cryptographic techniques to detect document tampering, such as generating hashes, message digests, or the like. In some embodiments, the document is stored as part of (or in association with) an “envelope” that is used to track and record information about the document as it progresses through its lifecycle of creation, transfer, signature, completion, and the like.


A signer operating the signer client device 161 then accesses, reviews, and signs the document stored by the ESS 110. In some embodiments, the ESS 110 transmits images or some other representation of the document to the signer client device 161, which in turn transmits signature data including an indication of the signer's signature (or intent to sign) to the ESS 110. The ESS 110 then securely stores the provided signature data in association with the document in the data store 115.


The rules manager 114 facilitates custody transfers of electronic signature documents as discussed herein. Initially, a sender or other user operating the sender client device 160 may associate custody transfer rules with an electronic signature document stored in the data store 115. The rules manager 114 tracks and executes the specified rules as appropriate. For example, if a rule indicates custody transfer upon document signature, the rules manager 114 monitors the document and, in response to a received signature, modifies (or causes to be modified) data structures or other records that specify or control access rights or operations associated with the document. In particular, access rights may be removed or disassociated from a first user. In addition or instead, the same or different access rights may be granted or otherwise associated with a second user. In some embodiments, custody transfers may occur between groups of users.


A custody transfer rule may be represented as a data structure, record in a database, or similar. The custody transfer rule may include indications of users that are impacted by the rule, events that trigger the rule, and access rights (e.g., view, modify, delete) that are shifted based on the rule and one or more events.


The UI manager 112 provides a view and a controller that facilitate user interaction with the ESS 110 and its various components. For example, the UI manager 112 may provide interactive access to the ESS 110, such that users can upload or download documents for signature, create and/or configure custody rules associated with or incorporated into signature documents, and the like. In some embodiments, access to the functionality of the UI manager 112 may be provided via a Web server, possibly executing as one of the other programs 130. In such embodiments, a user operating a Web browser (or other client) executing on one of the client devices 160-162 can interact with the ESS 110 via the UI manager 112.


The API 113 provides programmatic access to one or more functions of the ESS 110. For example, the API 113 may provide a programmatic interface to one or more functions of the ESS 110 that may be invoked by one of the other programs 130 or some other module. In this manner, the API 113 facilitates the development of third-party software, such as user interfaces, plug-ins, news feeds, adapters (e.g., for integrating functions of the ESS 110 into Web applications), and the like. In addition, the API 113 may be in at least some embodiments invoked or otherwise accessed via remote entities, such as a third-party system (not shown), to access various functions of the ESS 110. For example, a customer relationship management system may push or otherwise import customer data and/or agreements into the ESS via the API 113.


The data store 115 is used by the other modules of the ESS 110 to store and/or communicate information. The components of the ESS 110 use the data store 115 to record various types of information, including documents, signatures, custody rules, and the like. Although the components of the ESS 110 are described as communicating primarily through the data store 115, other communication mechanisms are contemplated, including message passing, function calls, pipes, sockets, shared memory, and the like.


The ESS 110 interacts via the network 150 with client devices 160-162. The network 150 may be any combination of one or more media (e.g., twisted pair, coaxial, fiber optic, radio frequency), hardware (e.g., routers, switches, repeaters, transceivers), and one or more protocols (e.g., TCP/IP, UDP, Ethernet, Wi-Fi, WiMAX) that facilitate communication between remotely situated humans and/or devices. In some embodiments, the network 150 may be or include multiple distinct communication channels or mechanisms (e.g., cable-based and wireless). The client devices 160-162 include personal computers, laptop computers, smart phones, personal digital assistants, tablet computers, and the like.


In an example embodiment, components/modules of the ESS 110 are implemented using standard programming techniques. For example, the ESS 110 may be implemented as a “native” executable running on the CPU 103, along with one or more static or dynamic libraries. In other embodiments, the ESS 110 may be implemented as instructions processed by a virtual machine that executes as one of the other programs 130. In general, a range of programming languages known in the art may be employed for implementing such example embodiments, including representative implementations of various programming language paradigms, including but not limited to, object-oriented (e.g., Java, C++, C#, Visual Basic.NET, Smalltalk, and the like), functional (e.g., ML, Lisp, Scheme, and the like), procedural (e.g., C, Pascal, Ada, Modula, and the like), scripting (e.g., Perl, Ruby, Python, JavaScript, VBScript, and the like), and declarative (e.g., SQL, Prolog, and the like).


The embodiments described above may also use either well-known or proprietary synchronous or asynchronous client-server computing techniques. Also, the various components may be implemented using more monolithic programming techniques, for example, as an executable running on a single CPU computer system, or alternatively decomposed using a variety of structuring techniques known in the art, including but not limited to, multiprogramming, multithreading, client-server, or peer-to-peer, running on one or more computer systems each having one or more CPUs. Some embodiments may execute concurrently and asynchronously, and communicate using message passing techniques. Equivalent synchronous embodiments are also supported. Also, other functions could be implemented and/or performed by each component/module, and in different orders, and by different components/modules, yet still achieve the described functions.


In addition, programming interfaces to the data stored as part of the ESS 110, such as in the data store 118, can be available by standard mechanisms such as through C, C++, C#, and Java APIs; libraries for accessing files, databases, or other data repositories; through scripting languages such as XML; or through Web servers, FTP servers, or other types of servers providing access to stored data. The data store 118 may be implemented as one or more database systems, file systems, or any other technique for storing such information, or any combination of the above, including implementations using distributed computing techniques.


Different configurations and locations of programs and data are contemplated for use with techniques described herein. A variety of distributed computing techniques are appropriate for implementing the components of the illustrated embodiments in a distributed manner including but not limited to TCP/IP sockets, RPC, RMI, HTTP, Web Services (XML-RPC, JAX-RPC, SOAP, and the like). Other variations are possible. Also, other functionality could be provided by each component/module, or existing functionality could be distributed amongst the components/modules in different ways, yet still achieve the functions described herein.


Furthermore, in some embodiments, some or all of the components of the ESS 110 may be implemented or provided in other manners, such as at least partially in firmware and/or hardware, including, but not limited to one or more application-specific integrated circuits (“ASICs”), standard integrated circuits, controllers executing appropriate instructions, and including microcontrollers and/or embedded controllers, field-programmable gate arrays (“FPGAs”), complex programmable logic devices (“CPLDs”), and the like. Some or all of the system components and/or data structures may also be stored as contents (e.g., as executable or other machine-readable software instructions or structured data) on a computer-readable medium (e.g., as a hard disk; a memory; a computer network or cellular wireless network or other data transmission medium; or a portable media article to be read by an appropriate drive or via an appropriate connection, such as a DVD or flash memory device) so as to enable or configure the computer-readable medium and/or one or more associated computing systems or devices to execute or otherwise use or provide the contents to perform at least some of the described techniques. Some or all of the system components and data structures may also be stored as data signals (e.g., by being encoded as part of a carrier wave or included as part of an analog or digital propagated signal) on a variety of computer-readable transmission mediums, which are then transmitted, including across wireless-based and wired/cable-based mediums, and may take a variety of forms (e.g., as part of a single or multiplexed analog signal, or as multiple discrete digital packets or frames). Such computer program products may also take other forms in other embodiments. Accordingly, embodiments of this disclosure may be practiced with other computer system configurations.


It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “includes,” “including,” “comprises,” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C . . . and N, the text should be interpreted as requiring one or more elements from the set {A, B, C, . . . N}, and not N in addition to one or more elements from the set {A, B, C}.


All of the above-cited references, including U.S. Provisional Application No. 61/614,371, filed Mar. 22, 2012, entitled “SYSTEM AND METHOD FOR RULES-BASED CONTROL OF CUSTODY OF ELECTRONIC SIGNATURE TRANSACTIONS” are incorporated herein by reference in their entireties. Where a definition or use of a term in an incorporated reference is inconsistent with or contrary to the definition or use of that term provided herein, the definition or use of that term provided herein governs.


While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment.

Claims
  • 1. A method executed by an electronic signature service (ESS) computing device, the method comprising: receiving an electronic signature document and associating a custody transfer rule with the electronic signature document from a client device associated with a first user, the custody transfer rule comprising a data structure used by the ESS computing device and further comprising: data identifying users in a custody chain for the electronic signature document; anddata identifying an event to transition custody of the electronic signature document from a first user of the custody chain to a second user of the custody chain, the custody of the electronic signature document comprising an access right with respect to the electronic signature document, and the event comprising a response to an electronic signature request;transmitting the electronic signature request to a client device associated with a third user not included in the custody chain;in response to detecting the event, transferring custody of the electronic signature document from the first user to the second user according to the custody transfer rule; andstoring data indicating the transfer of custody of the electronic signature document to prevent the client device associated with the first user from accessing the electronic signature document according to the access right with respect to the electronic signature document, and to allow access to the electronic signature document according to the access right with respect to the electronic signature document to a client device associated with the second user.
  • 2. The method of claim 1, wherein the response to the electronic signature request comprises one of: a receipt of signature of the electronic signature document by the third user; ora refusal of signature of the electronic signature document by the third user.
  • 3. The method of claim 2, wherein the response to the electronic signature request comprises the receipt of signature of the electronic signature document by the third user, and the method further comprises: storing a second data structure comprising information corresponding to the signature of the electronic signature document, including information identifying the third user, date information, history information, and form data entered by the third user.
  • 4. The method of claim 3, wherein after transferring custody of the electronic signature document from the first user to the second user, the first user retains a second access right to view the electronic signature document and to view the second data structure comprising information corresponding to the signature of the electronic signature document.
  • 5. The method of claim 3, wherein the access right comprises access to view the electronic signature document and to view the second data structure comprising information corresponding to the signature of the electronic signature document.
  • 6. The method of claim 1, wherein the access right comprises a right to modify the contents of electronic signature document.
  • 7. The method of claim 1, wherein the access right comprises a right to delete the electronic signature document from the ESS computing device.
  • 8. A computer-readable non-transitory medium comprising instructions that, when executed by a computing system, facilitate custody transfers of electronic signature documents, by performing a method comprising: receiving an electronic signature document and associating a custody transfer rule with the electronic signature document from a client device associated with a first user, the custody transfer rule comprising a data structure used by an electronic signature service (ESS) and further comprising: data identifying users in a custody chain for the electronic signature document; anddata identifying an event to transition custody of the electronic signature document from a first user of the custody chain to a second user of the custody chain, the custody of the electronic signature document comprising an access right with respect to the electronic signature document, and the event comprising a response to an electronic signature request;transmitting the electronic signature request to a client device associated with a third user not included in the custody chain;in response to detecting the event, transferring custody of the electronic signature document from the first user to the second user according to the custody transfer rule; andstoring data indicating the transfer of custody of the electronic signature document to prevent any client device associated with the first user from accessing the electronic signature document according to the access right with respect to the electronic signature document, and to allow access to the electronic signature document according to the access right with respect to the electronic signature document to a client device associated with the second user.
  • 9. The computer-readable non-transitory medium of claim 8, wherein the method further comprises: transmitting an email to the third user, the email including a link operable to access the electronic signature document at the electronic signature service, wherein the event comprises receiving an indication that the third user has activated the link to access the electronic signature document.
  • 10. The computer readable non-transitory medium of claim 8, wherein the response to the electronic signature request comprises one of: a receipt of signature of the electronic signature document by the third user; ora refusal of signature of the electronic signature document by the third user.
  • 11. The computer readable non-transitory medium of claim 10, wherein the response to the electronic signature request comprises the receipt of signature of the electronic signature document by the third user, and the method further comprises: storing a second data structure comprising information corresponding to the signature of the electronic signature document, including information identifying the third user, date information, history information, and form data entered by the third user.
  • 12. The computer readable non-transitory medium of claim 11, wherein after transferring custody of the electronic signature document from the first user to the second user, the first user retains a second access right to view the electronic signature document and to view the second data structure comprising information corresponding to the signature of the electronic signature document.
  • 13. The computer readable non-transitory medium of claim 11, wherein the access right comprises access to view the electronic signature document and to view the second data structure comprising information corresponding to the signature of the electronic signature document.
  • 14. A computing system configured to facilitate custody transfers of electronic signature documents, comprising: a hardware processorto: receive an electronic signature document and associate a custody transfer rule with the electronic signature document from a client device associated with a first user, the custody transfer rule comprising a data structure used by an electronic signature service (ESS) and further comprising: data identifying users in a custody chain for the electronic signature document; anddata identifying an event to transition custody of the electronic signature document from a first user of the custody chain to a second user of the custody chain, the custody of the electronic signature document comprising an access right with respect to the electronic signature document, and the event comprising a response to an electronic signature request;transmit the electronic signature request to a client device associated with a third user not included in the custody chain;in response to detecting the event, transfer custody of the electronic signature document from the first user to the second user according to the custody transfer rule; andstore data indicating the transfer of custody of the electronic signature document to prevent the client device associated with the first user from accessing the electronic signature document according to the access right with respect to the electronic signature document, and to allow access to the electronic signature document according the access right with respect to the electronic signature document to a client device associated with the second user.
  • 15. The computing system of claim 14, wherein the custody transfer rule specifies, for each of multiple operations to access the electronic signature document according to the access right with respect to the electronic signature document, whether each of the first and second user can perform the operation before and after the occurrence of the event, wherein the access right includes at least one of viewing, modifying, or deleting information related to the electronic signature document.
  • 16. The system of claim 14, wherein the response to the electronic signature request comprises one of: a receipt of signature of the electronic signature document by the third user; ora refusal of signature of the electronic signature document by the third user.
  • 17. The system of claim 16, wherein the response to the electronic signature request comprises the receipt of signature of the electronic signature document by the third user, and the hardware processor is further configured to: store a second data structure comprising information corresponding to the signature of the electronic signature document, including information identifying the third user, date information, history information, and form data entered by the third user.
  • 18. The system of claim 17, wherein after the transfer of custody of the electronic signature document from the first user to the second user, the first user is to retain a second access right to view the electronic signature document and to view the second data structure comprising information corresponding to the signature of the electronic signature document.
  • 19. The system of claim 17, wherein the access right comprises access to view the electronic signature document and to view the second data structure comprising information corresponding to the signature of the electronic signature document.
PRIORITY CLAIM

This application claims the benefit of U.S. Provisional Application No. 61/614,371, filed Mar. 22, 2012.

US Referenced Citations (215)
Number Name Date Kind
5040142 Mori et al. Aug 1991 A
5220675 Padawer et al. Jun 1993 A
5222138 Balabon et al. Jun 1993 A
5337360 Fischer Aug 1994 A
5390247 Fischer Feb 1995 A
5465299 Matsumoto et al. Nov 1995 A
5544255 Smithies et al. Aug 1996 A
5553145 Micali Sep 1996 A
5615268 Bisbee et al. Mar 1997 A
5629982 Micali May 1997 A
5689567 Miyauchi Nov 1997 A
5748738 Bisbee et al. May 1998 A
5813009 Johnson et al. Sep 1998 A
5832499 Gustman Nov 1998 A
5872848 Romney et al. Feb 1999 A
5898156 Wilfong Apr 1999 A
6021202 Anderson et al. Feb 2000 A
6067531 Hoyt et al. May 2000 A
6085322 Romney et al. Jul 2000 A
6092080 Gustman Jul 2000 A
6119229 Martinez et al. Sep 2000 A
6128740 Curry et al. Oct 2000 A
6161139 Win et al. Dec 2000 A
6185587 Bernardo et al. Feb 2001 B1
6185683 Ginter et al. Feb 2001 B1
6199052 Mitty et al. Mar 2001 B1
6210276 Mullins Apr 2001 B1
6237096 Bisbee et al. May 2001 B1
6289460 Hajmiragha Sep 2001 B1
6321333 Murray Nov 2001 B1
6327656 Zabetian Dec 2001 B2
6367010 Venkatram et al. Apr 2002 B1
6367013 Bisbee et al. Apr 2002 B1
6446115 Powers Sep 2002 B2
6470448 Kuroda et al. Oct 2002 B1
6584466 Serbinis et al. Jun 2003 B1
6615348 Gibbs Sep 2003 B1
6658403 Kuroda et al. Dec 2003 B1
6671805 Brown et al. Dec 2003 B1
6728762 Estrada et al. Apr 2004 B1
6751632 Petrogiannis Jun 2004 B1
6754829 Butt et al. Jun 2004 B1
6796489 Slater et al. Sep 2004 B2
6807633 Pavlik Oct 2004 B1
6829635 Townshend Dec 2004 B1
6912660 Petrogiannis Jun 2005 B1
6931420 Silvester et al. Aug 2005 B1
6938157 Kaplan Aug 2005 B2
6944648 Cochran et al. Sep 2005 B2
6947911 Moritsu et al. Sep 2005 B1
6959382 Kinnis et al. Oct 2005 B1
6961854 Serret-Avila et al. Nov 2005 B2
6973569 Anderson et al. Dec 2005 B1
6990684 Futamura et al. Jan 2006 B2
7039805 Messing May 2006 B1
7059516 Matsuyama et al. Jun 2006 B2
7069443 Berringer et al. Jun 2006 B2
7093130 Kobayashi et al. Aug 2006 B1
7100045 Yamada et al. Aug 2006 B2
7103778 Kon et al. Sep 2006 B2
7130829 Banerjee et al. Oct 2006 B2
7162635 Bisbee et al. Jan 2007 B2
7167844 Leong et al. Jan 2007 B1
7197644 Brewington Mar 2007 B2
7237114 Rosenberg Jun 2007 B1
7340608 Laurie et al. Mar 2008 B2
7360079 Wall Apr 2008 B2
7395436 Nemovicher Jul 2008 B1
7424543 Rice, III Sep 2008 B2
7437421 Bhogal et al. Oct 2008 B2
7523315 Hougaard et al. Apr 2009 B2
7533268 Catorcini et al. May 2009 B1
7554576 Erol et al. Jun 2009 B2
7562053 Twining et al. Jul 2009 B2
7568101 Catorcini et al. Jul 2009 B1
7568104 Berryman et al. Jul 2009 B2
7581105 Dietl Aug 2009 B2
7657832 Lin Feb 2010 B1
7660863 Boursetty et al. Feb 2010 B2
7660981 Hunt Feb 2010 B1
7788259 Patterson et al. Aug 2010 B2
7934098 Hahn et al. Apr 2011 B1
7953977 Maruyama et al. May 2011 B2
8103867 Spitz Jan 2012 B2
8132013 Meier Mar 2012 B2
8286071 Zimmerman et al. Oct 2012 B1
8588483 Hicks et al. Nov 2013 B2
8612349 Ledder et al. Dec 2013 B1
8627500 Rogel et al. Jan 2014 B2
8924302 Bisbee et al. Dec 2014 B2
20010002485 Bisbee et al. May 2001 A1
20010018739 Anderson et al. Aug 2001 A1
20010034739 Anecki et al. Oct 2001 A1
20010034835 Smith Oct 2001 A1
20020004800 Kikuta et al. Jan 2002 A1
20020019937 Edstrom et al. Feb 2002 A1
20020026427 Kon et al. Feb 2002 A1
20020026582 Futamura et al. Feb 2002 A1
20020040431 Kato et al. Apr 2002 A1
20020069179 Slater et al. Jun 2002 A1
20020069358 Silvester Jun 2002 A1
20020129056 Conant et al. Sep 2002 A1
20020138445 Laage et al. Sep 2002 A1
20020143711 Nassiri Oct 2002 A1
20020162000 Bensler Oct 2002 A1
20020178187 Rasmussen et al. Nov 2002 A1
20020184485 Dray et al. Dec 2002 A1
20020194219 Bradley et al. Dec 2002 A1
20020196478 Struble Dec 2002 A1
20030048301 Menninger Mar 2003 A1
20030051016 Miyoshi et al. Mar 2003 A1
20030078880 Alley et al. Apr 2003 A1
20030120553 Williams Jun 2003 A1
20030120930 Simpson et al. Jun 2003 A1
20030131073 Lucovsky et al. Jul 2003 A1
20030140252 Lafon et al. Jul 2003 A1
20030217264 Martin et al. Nov 2003 A1
20030217275 Bentley et al. Nov 2003 A1
20040054606 Broerman Mar 2004 A1
20040078337 King et al. Apr 2004 A1
20040107352 Yui et al. Jun 2004 A1
20040117627 Brewington Jun 2004 A1
20040133493 Ford et al. Jul 2004 A1
20040181756 Berringer et al. Sep 2004 A1
20040225884 Lorenzini et al. Nov 2004 A1
20040230891 Pravetz et al. Nov 2004 A1
20040250070 Wong Dec 2004 A1
20040255114 Lee et al. Dec 2004 A1
20040255127 Arnouse Dec 2004 A1
20050033811 Bhogal et al. Feb 2005 A1
20050049903 Raja Mar 2005 A1
20050071658 Nath et al. Mar 2005 A1
20050076215 Dryer Apr 2005 A1
20050091143 Schmidt et al. Apr 2005 A1
20050120217 Fifield et al. Jun 2005 A1
20050165626 Karpf Jul 2005 A1
20050182684 Dawson et al. Aug 2005 A1
20050182956 Ginter et al. Aug 2005 A1
20050192908 Jorimann et al. Sep 2005 A1
20050231738 Huff et al. Oct 2005 A1
20060047600 Bodenheim et al. Mar 2006 A1
20060161780 Berryman et al. Jul 2006 A1
20060161781 Rice et al. Jul 2006 A1
20060174199 Soltis et al. Aug 2006 A1
20060205476 Jubinville Sep 2006 A1
20060230282 Hausler Oct 2006 A1
20060259440 Leake et al. Nov 2006 A1
20060261545 Rogers Nov 2006 A1
20060294152 Kawabe et al. Dec 2006 A1
20070026927 Yaldoo et al. Feb 2007 A1
20070079139 Kim Apr 2007 A1
20070088958 Qa'Im-maqami Apr 2007 A1
20070100765 Naganuma May 2007 A1
20070118732 Whitmore May 2007 A1
20070130186 Ramsey et al. Jun 2007 A1
20070136361 Lee et al. Jun 2007 A1
20070143085 Kimmel Jun 2007 A1
20070165865 Talvitie Jul 2007 A1
20070198533 Foygel et al. Aug 2007 A1
20070208944 Pavlicic Sep 2007 A1
20070220260 King Sep 2007 A1
20070271592 Noda et al. Nov 2007 A1
20070289022 Wittkotter Dec 2007 A1
20080016357 Suarez Jan 2008 A1
20080034213 Boemker et al. Feb 2008 A1
20080097777 Rielo Apr 2008 A1
20080141033 Ginter et al. Jun 2008 A1
20080209313 Gonser Aug 2008 A1
20080209516 Nassiri Aug 2008 A1
20080216147 Duffy Sep 2008 A1
20080235577 Veluchamy et al. Sep 2008 A1
20080260287 Berryman et al. Oct 2008 A1
20080313723 Naono et al. Dec 2008 A1
20090024912 McCabe et al. Jan 2009 A1
20090025087 Peirson, Jr. et al. Jan 2009 A1
20090044019 Lee et al. Feb 2009 A1
20090099881 Hanna et al. Apr 2009 A1
20090132351 Gibson May 2009 A1
20090138730 Cook et al. May 2009 A1
20090145958 Stoutenburg et al. Jun 2009 A1
20090164488 Katsurabayashi Jun 2009 A1
20090185241 Nepomniachtchi Jul 2009 A1
20090268903 Bojinov et al. Oct 2009 A1
20090292786 Mccabe et al. Nov 2009 A1
20100088364 Carter et al. Apr 2010 A1
20100122094 Shima May 2010 A1
20100153011 Obrea et al. Jun 2010 A1
20100217987 Shevade Aug 2010 A1
20100235727 Ashton et al. Sep 2010 A1
20100242085 Dutta et al. Sep 2010 A1
20100274863 Foygel et al. Oct 2010 A1
20100287260 Peterson et al. Nov 2010 A1
20100293094 Kolkowitz et al. Nov 2010 A1
20110093769 Dunn et al. Apr 2011 A1
20110119165 Zee May 2011 A1
20110126022 Sieberer May 2011 A1
20110153560 Bryant et al. Jun 2011 A1
20110238510 Rowen et al. Sep 2011 A1
20110264907 Betz et al. Oct 2011 A1
20110314371 Peterson et al. Dec 2011 A1
20120072837 Triola Mar 2012 A1
20120180135 Hodges et al. Jul 2012 A1
20120209970 Scipioni et al. Aug 2012 A1
20120271882 Sachdeva et al. Oct 2012 A1
20120304265 Richter et al. Nov 2012 A1
20130019156 Gonser et al. Jan 2013 A1
20130019289 Gonser et al. Jan 2013 A1
20130050512 Gonser et al. Feb 2013 A1
20130060661 Block et al. Mar 2013 A1
20130067243 Tamayo-Rios et al. Mar 2013 A1
20130159720 Gonser et al. Jun 2013 A1
20130179676 Hamid Jul 2013 A1
20130254111 Gonser et al. Sep 2013 A1
20130263283 Peterson et al. Oct 2013 A1
20140019761 Shapiro Jan 2014 A1
Foreign Referenced Citations (21)
Number Date Country
101299256 Nov 2008 CN
1238321 Jun 2001 EP
2000048072 Feb 2000 JP
2003271529 Sep 2003 JP
2005267438 Sep 2005 JP
2008117258 May 2008 JP
2008225527 Sep 2008 JP
20000049674 Aug 2000 KR
1020020092595 Dec 2002 KR
1020070059931 Jun 2007 KR
100929488 Dec 2009 KR
20090122657 Dec 2009 KR
2400811 Nov 2005 RU
2291491 Oct 2007 RU
2300844 Jun 2010 RU
9607156 Mar 1996 WO
03091834 Nov 2003 WO
2007075235 Jul 2007 WO
2008124627 Oct 2008 WO
2009012478 Jan 2009 WO
2010105262 Sep 2010 WO
Non-Patent Literature Citations (13)
Entry
Wheeler et al., “DocuSign Unveils new Scalable Product and Support Offerings of Electronic Signature and Electronic Contract Execution,” DocuSign The Fastest Way to Get a Signature, 2 pp., Jan. 2008.
Borozdin et al., “DocuSign Connect Service Guide,” DocuSign, Inc., pp. 1-9, 2008.
eLynx Adds Workflow Management to Electronic Document Platform—new Workflow Capabilities Provide for Enhanced Electronic Loan Processing, eLynx, http://www.elynx.com/news/view/82, 2 pp. Jan. 2009.
Laurens Leurs; The history of PDF; Feb. 14, 2010; Prepressure.com; pp. 1-12.
Brown, “Digital Signatures: Can They Be Accepted As Legal Signatures in EID?”, Dec. 1993, ACM, p. 86-92.
Herzberg et al., “Surf'N'Sign: Client Signatures on Web Documents”, 1998, IEEE, vol. 37 Issue 1, p. 61-71.
Kwok et al., “An Automatic Electronic Contract Document Signing System in a Secure Environment”, 2005, IEEE, p. 497-502.
Su et al., “Signature-In-Signature Verification Via a Secure Simple Network Protocol”, 2010, IEEE, p. 1-4.
Zefferer et al., “An Electronic-Signature Based Circular Resolution Database System,” Mar 2010, ACM, p. 1840-1845.
Kamara et al., “Cryptographic Cloud Storage”, 2010, Financial Cryptography and Data Security, p. 136-149.
Harold, Elliotte Rusty, XML Bible. IDG Books Worldwide, Inc., 1999, p. 191-192.
“European Application Serial No. 13764546.1, Extended European Search Report mailed Oct. 30, 2015”, 6 pgs.
Du, Timon C, et al., “Document access control in organisational workflows”, International Journal Of Information And Computer Security, vol. 1, No. 4, (2007), 437-454.
Related Publications (1)
Number Date Country
20130263283 A1 Oct 2013 US
Provisional Applications (1)
Number Date Country
61614371 Mar 2012 US