Method of using text and picture formatting options such as Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline, Character effects as a part of electronic signature

ABSTRACT

We propose a method that uses formatting options of Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline, and Character Effects as a part of electronic signature.

CROSS-REFERENCE TO RELATED APPLICATIONS

Not Applicable

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT Not Applicable REFERENCE TO A SEQUENCE LISTING, A TABLE, OR A COMPUTER PROGRAM, LISTING COMPACT DISC APPENDIX

Not Applicable

BACKGROUND OF THE INVENTION

The proposed invention concerns security. In particular, proposed method is to provide/improve/strengthen security for electronic signatures required for actions on individual's any kind of data, information, credit, finances, services obtained (online and or offline), using formatting options.

Users are required to provide electronic signatures, when they do certain actions in software applications and websites for bank accounts, view and edit data, use cloud hosted applications, make purchases, make approvals, make rejections or make comments for example.

In spite of many new means to do signature electronically, plain text based signature and password-based user signature is still widely used by installed software applications, smartphone apps, websites and web services due to its convenience, and ease in use and deployment. With ever growing instances of passwords and credentials getting compromised its necessary to invent strong mechanism which is multi-dimensional but at the same time simple enough for users to work with.

In password-based user signatures users are required to input textual password to identify them as valid user performing the action. Now because of its simplicity passwords are prone to hacking. Users are always asked to increase complexity of their passwords which leads to user forgetting them often and as a result instances user getting locked out of their own accounts.

BRIEF SUMMARY OF THE INVENTION

We propose methods which fortifies, simplifies electronic signature and gives user ample options to personalize it. It gives users formatting options to personalize it.

As per our method, user can format signature by choosing combination of one or more font color for each character or word in password. User can also apply one or more factor of Font, Font Size, Font Color, Shading, Font Style, Font Effects, Font Underline and Character effects for each character or word in signature.

Our method increases the complexity of the user signature but at the same time keeps it simple to remember and use.

For Electronic signature user can provide their name or initials that is formatted in the same way as his sample electronic signatures provided earlier to the system or as per formatting instructions sent to him. This is not same as real hand drawn signature but lot of improvement upon basic non formatted text entry of name or initials.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING Flowcharts

FIG. 1. Electronic Signature using formatting options, no validation against any signature stored earlier. This workflow is for scenarios where signatures are accepted on good faith.

FIG. 2. Electronic Signature compared with configured earlier.

User asked to provide his formatted electronic signature based on formatting options that he remember when he originally configured electronic signatures. If match occurs action is allowed.

FIG. 3. Electronic Signature using formatting options

User asked to format signature using formatting options sent to user. If match occurs action is allowed.

DETAILED DESCRIPTION

Given below are the examples of user choosing different factor values for different characters in his signature text.

-   -   a. Example of User choosing different colors for different         characters:         !     -   Here “We-” is colored in blue, “are-2” colored in red, “H”         colored in Green, “app” colored in pink and “y!” colored in         black.     -   b. Example of User choosing different fonts for different         characters:     -   Here “We-” is having Font Arial, “are-2” is having Font Lucida         Handwriting, “H” is having Font Arial Black, “app” is having         Font Tempus Sans ITC and “y!” is having Font Broadway.     -   c. Example of User choosing different font sizes for different         characters:     -   Here “We-” is having Font size 11, “are-2” is having Font size         16, “H” is having Font size 8, “app” is having Font size 14 and         “y!” is having Font size 9.     -   d. Example of User choosing different font styles for different         characters:     -   Here “We-” is not having Font style “Regular”, “are-2” is having         Font style “Bold”, “H” is having Font style “Italic”, “appy!” is         having Font style “Bold Italic”.     -   e. Example of User choosing different font effects for different         characters:     -   Here “We-” is having Font effect “Superscript”, “are-” is having         Font effect “small caps”, “not” is having Font effect         “Strikethrough”, “very” is having Font effect “Double         Strikethrough”, HAPPY! is having Font effect ALL CAPS.     -   f. Example of User choosing different font underline style for         different characters: We-are-2Happy         Here “We-are” is having no Font underline style, “2Happy” is         having Font Underline style.     -   g. Example of User choosing different shading for different         characters:

-   -   Here “We-2-are” is having shading of dark black, “very” is         having shading of turquoise and “Happy!” is having shading of         brick red.         Given below is the example of user using combination of factors         of font, font style, font size and font color. User can         configure one or more set of factors for signature characters.         E.g.         on Monday, Wednesday, Friday and         on the rest of the days of the week.

These formatting options gives lot of choice and flexibility to users and at the same time makes it very difficult for hackers to steal, store and use stolen signature information. 

1. A computer-implemented process of accepting electronic signature from user that is personalized using formatting options, comprising: using a computing device to perform the following process actions: capturing signature text from user which are formatted using formatting options; marking the user action as electronically signed; alerting user via alert communication methods of user choice that can include email, text message, voice message, voice call, SMS, audible alarm, visual clues; logging the user action, process steps and its outcome;
 2. The process of claim 1, where in the user action can be document approval, work flow step approval, transaction approval, approval of data changes, approval of action taken during the course of business, approval of action taken during usage of software application, program or software service and signature text can be user name, user initials, user identifier, user pin or any other text assigned or sent to user that identifies the user.
 3. A computer-implemented process of accepting electronic signature from user that is personalized using formatting options, comprising: using a computing device to perform the following process actions: capturing signature text from user which are formatted using formatting options; comparing the captured formatted signature text against formatted signature text stored on the server that is designated by user as valid prior to requesting access; flagging the captured electronic signature as valid if match occurs and marking the user action as electronically signed, flagging the captured electronic signature as invalid and rejecting it to mark as signed if match doesn't occur; alerting user via alert communication methods of user choice that can include email, text message, voice message, voice call, SMS, audible alarm, visual clues; logging the user action, process steps and its outcome;
 4. The process of claim 3, where in the user action can be document approval, work flow step approval, transaction approval, approval of data changes, approval of action taken during the course of business, approval of action taken during usage of software application, program or software service and signature text can be user name, user initials, user identifier, user pin or any other text assigned or sent to user that identifies the user.
 5. A computer-implemented process of accepting electronic signature from user that is personalized using formatting options, comprising: using a computing device to perform the following process actions: capturing signature text from user which are formatted using formatting options; sending formatting instructions to the user to format signature text; comparing the captured formatted signature text against system generated formatted signature text using same formatting options that user is instructed to use; flagging the captured electronic signature as valid if match occurs and marking the user action as electronically signed, flagging the captured electronic signature as invalid and rejecting it to mark as signed if match doesn't occur; alerting user via alert communication methods of user choice that can include email, text message, voice message, voice call, SMS, audible alarm, visual clues; logging the user action, process steps and its outcome;
 6. The process of claim 5, where in the user action can be document approval, work flow step approval, transaction approval, approval of data changes, approval of action taken during the course of business, approval of action taken during usage of software application, program or software service and signature text can be user name, user initials, user identifier, user pin or any other text assigned or sent to user that identifies the user. 