cover image: Preventing Notary Fraud: Leveraging Existing Technologies & Trusted Records - June 2024

Preventing Notary Fraud: Leveraging Existing Technologies & Trusted Records - June 2024

24 Jun 2024

National Association of Secretaries of State (NASS), have put forth a common set of Confirmation of a notary’s identity is standards for the authorization and foundational to the recommendations we performance of RON, grounded in the make in the following sections regarding the issuance and application of digital use of digital certificates and registries. [...] By leveraging As we continue into the second decade of digital technologies to enhance the RON, existing frameworks for identity commissioning process, states can proofing, digital certificates, and public significantly reduce the risks associated registries can be leveraged and improved to with notary fraud and bolster the security thwart the threat of notary impersonation and trustworthiness of. [...] In the context of notarization, after verifying a signer's identity and completing the Role of Certificate Authorities notarization, the notary uses their digital certificate to seal the document. [...] This certificate includes an who performed the notarization and X.5091 file that identifies the Certificate confirms that the document has not been Authority and notary and contains public modified, as only the notary who was issued and private encryption keys, known as an the digital certificate can access the private asymmetric key pair, which are used to key and apply it to a document. [...] When the document is opened, the PDF reader will hash the document again to Public Key Infrastructure (PKI) produce a plain-text hash, decrypt the Technology embedded hash with the public key, and compare the two hashes to verify the Digital certificate technology is based on document’s integrity.
Pages
5
Published in
United States of America