Request your free demo IvCert, your electronic signature platform and certified delivery.
For each document sent for signature, evidence of the sending is collected. Who sends it? To whom? Has it been received? Has it been signed?
All the process is archived and safeguarded so that it can serve as evidence in the event of litigation, where Ivnosys acts as a Trusted Service Provider (PSC). Its flexibility is its main feature, as it allows the creation of multiple signature circuits, which can include different actors (corporate or external) and different signature methods for each case. Signature with digital certificate, e-signature with OTP via SMS, biometric signature, click-wrap acceptande or certified electronic sending.
Security starts with protecting what you sign. With IvCert you ensure an audit and evidence collection with total legal validity.
Signature with digital certificate in the cloud, suitable for electronic signature of documents or acknowledgement of receipt of notifications. It has the highest legal range, guaranteeing maximum security of signed documents.
Signature method with the highest legal range, through which to accept the content of a document with full guarantees, ensuring the identity of the signatory and the integrity of the message.
Digitized handwritten signature with biometric data collection (contact position, speed and pen pressure) in a specialized device. Provides certification of the message content and the signature.
Explicit acceptance of a communication and/or document with signature using a one-time PIN (OTP) sent by SMS to the mobile. Provides certified evidence of the documents content and message acceptance.
Explicit acceptance of a communication with one or more conditions through an acceptance dialog box. Suitable for signing conditions of use and documents or approving them.
Certified delivery of a message by email or SMS. In addition, you will have the option of downloading the document.
The video identification system allows the verification of the customer’s identity through facial recognition technology. During the process, biometric data is compared between the user’s real image and the ID photo, making the identification process more complete and secure.