The Future of e-Signatures
Securely Authorize your e-Signature
How to Use AuthuSign for Signature Authorization
Pay-Per-Auth
Get signature authorization certificates for $3.00
AuthuSign safeguards your signature and ensures document authenticity.
AuthuSign prioritizes confidentiality. Documents remain confidential, only the intent to sign is recorded.
Verification and Content Agnostic Signing.
Frequently asked questions
Some of the most common questions. Can’t find the right answer? Click here to contact us
What is AuthuSign?
AuthuSign is a secure and innovative e-signature platform that utilizes Commitment to a Document Hash (CDH).
What is the difference between traditional e-signatures and AuthuSign’s verification of content agnostic signing (VCAS)?
Traditional e-signatures often store the entire document electronically. VCAS focuses on signing a unique identifier (hash) of the document, not the content itself. This prioritizes security while protecting document confidentiality.
Is AuthuSign secure?
Absolutely. AuthuSign leverages SHA 256, known for its robust cryptography, to ensure tamper-proof verification of your signatures.
Is my document confidential with AuthuSign?
Yes. Unlike some e-signature solutions, AuthuSign prioritizes privacy. The document content itself is not stored, safeguarding sensitive information.
How does the signing process work with AuthuSign?
- Document Creation and Signing: The document owner creates a document, applies a signature (/s/SignerName) for signer, and hashes the document.
- Signature Authorization Request: The document owner completes the signature authorization request with AuthuSign. The document owner directly emails the original document to the signer.
- Signer Authorization: The signer verifies the document’s hash and authorizes the signature.
What do I need to sign with AuthuSign?
All you need is a valid email address to use AuthuSign.
Can I see a demonstration of the signing process?
Yes! We offer explainer videos and interactive elements on our website to showcase the VCAS signing process in detail.
What is Commitment to a Document Hash (CDH)?
CDH is an innovative approach to e-signatures where users sign a unique hash of the document, not the entire document itself.
Why use SHA 256?
SHA-256, a SHA-2 (Secure Hash Algorithm 2) family member, is a robust and secure hash function compared to SHA-1. It produces a hash value of 256 bits. The double length of the output results in a stronger secure hash function, making it more secure against brute force attacks.
Do I need to be familiar with cryptography technology to use AuthuSign?
No prior cryptography knowledge is necessary. AuthuSign’s user interface is designed for ease of use, focusing on a streamlined signature authorization experience.
How does AuthuSign protect my privacy?
By not storing the document content, AuthuSign prioritizes confidentiality. Only the signing intent for a specific document is recorded.
How can I verify the authenticity of a signed document with AuthuSign?
Anyone can verify the signature by obtaining the document’s hash and the signer’s email. This allows for verification of the signed intent without revealing the document content.
Experience the Future of E-Signatures.
AuthuSign leverages cryptography for tamper-proof verification of document intent, not content.