Articles in this section

See more

How does the service guarantee the confidentiality of the documents to be signed?

Through the virtual machine we provide, which is installed within your own infrastructure, we ensure the confidentiality of the information to be signed. The original documents are sent to the virtual machine, which calculates the hash (a mathematical algorithm that transforms data blocks into a new sequence of characters) and sends it to the Uanataca service, where the actual electronic signature is performed.

It is practically impossible to reconstruct the original document from the hash. Once the signed hash is returned to the virtual machine, the electronically signed document is assembled there. The original information never leaves your infrastructure.

Was this article helpful?
0 out of 0 found this helpful