਍ഀ ਍ഀ ਍ഀ Atomic Signatures™ from Law-on-Line਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ

਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ
਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ
਍ഀ ਍ഀ
Atomic ਍ഀ Signatures਍ഀ
    ਍ഀ
਍ഀ
਍ഀ ਍ഀ
਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ
 
 

਍ഀ

਍ഀ

Atomic Signatures™ ਍ഀ leverage electronic cryptographic signatures ਍ഀ at a server for the benefit of the client. ਍ഀ

A server authenticates ਍ഀ signers on the basis of passwords, biometrics, certificates or security ਍ഀ tokens. ਍ഀ

Signatures are ਍ഀ affixed at the server using encryption. ਍ഀ

Atomic Signatures™ ਍ഀ use symmetric encryption, either alone, or in connection with asymmetric ਍ഀ encryption, which offers enhanced protection. ਍ഀ

XKI Atomic Signatures™ ਍ഀ are a combination of the two technologies. ਍ഀ

Atomic Signatures™ ਍ഀ simply, and elegantly enable effective, easy to use, yet inexpensive electronic ਍ഀ signatures as meta-data that is designed to endure.਍ഀ

Atomic Signatures™ ਍ഀ provide an underpinning of the LegalXML-OASIS ਍ഀ e-notarization TC symmetric signature profile. ਍ഀ

To find out more ਍ഀ about Atomic Signatures™ download the White ਍ഀ Paper.

਍ഀ

਍ഀ View Terms and Conditions of Use    

਍ഀ

View Privacy Policy   ਍ഀ ਍ഀ

਍ഀ
਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ ਍ഀ

U.S. ਍ഀ Patent No. 6,745,327 and U.S. Patent No. 7,039,805
                     Copyright ਍ഀ Law-on-Line, Inc. 2001-2006

਍ഀ ਍ഀ ਍ഀ