The rise of the digital signature – can you protect cryptographical innovations?

Terence Broderick

A close-up view of a digital circuitry design with glowing orange and blue lines and components on a dark background.

Remember face-to-face business meetings, where you could make agreements in the physical world and sign by hand on the dotted line? During the past year, when all such meetings were shunted into the virtual realm, we have become increasingly reliant on digital signatures. If you’re innovating to improve digital signatures, or working on any type of cryptographic inventions, this one’s for you — your invention could benefit from IP protection to help you commercialise.

What is a digital signature? #

To understand how to protect aspects of a digital signature, we must first spell out exactly what one is. While the concept of an electronic signature has been around for a long time, a digital signature is considered to be more sophisticated and supported by cryptographical techniques.

In principle, a digital signature associates the content of a document with a public-private key pair, generated using public key infrastructure (PKI) techniques. It typically applies principles of abstract algebra (a branch of mathematics that covers the key concepts of groups, rings and fields) to generate signatures that are very difficult to infiltrate.

Digital signatures are thought to have been initially developed in the early 1970s at Government Communication Headquarters (GCHQ) in the UK. They have been used for many years to sign documents where the authenticity of the content is key. Patent applications would be one example of such a document.

Digital signatures are also frequently used in situations where it is important to detect forgery or tampering. They are commonly used during the distribution of software and the approval of financial transactions.

The changing world #

With digital signatures having become a staple of everyday life, they’re set to grow in importance even after we return to normality post-lockdown.

The increasing use of over-the-air technology when delivering software updates to vehicles is a huge potential growth area for digital signatures, which could provide the necessary security without interrupting the use of the vehicle. Essentially, the vehicle and the software provider would have their own digital signatures that can be provided by the vehicle automatically, without (at least for certain applications) requiring driver input.

The proliferation of the Internet-of-Things (IoT) is another area that is set to see considerable development in this space. Devices could each have their own digital signatures, enabling them to sign their own messages when communicating with other devices on the IoT.

Vulnerabilities of digital signatures #

However, digital signatures are not perfect and, in the age of ever more powerful computers and knowledge about cryptographic concepts, vulnerabilities are inherent and can be exploited. Each application of digital signatures will no doubt throw up their own challenges but there are some challenges which will no doubt be common to all applications:

These typically reside in:

  • hackers obtaining the private keys used to sign messages or documents
  • the manipulation of the signing procedure
  • affecting the presentation of the message or document (i.e. by a malicious actor ensuring that a signer sees something different from what they intend to sign).

The increased focus on the use of digital signatures during the COVID-19 pandemic is sure to have identified a raft of problems — and, naturally, solutions are sure to have been developed.

Digital signatures — what can be protected with IP? #

For example, you may have identified an application of mathematics that makes the digital signature more difficult to infiltrate, or developed decryption software to highlight the likelihood of a malicious actor having obtained private keys used to sign the document (thereby introducing the question of an attack on its content).

Even though this may involve the application of mathematics or another abstract concept, if the application of mathematics addresses a technical problem then it may well be patentable.

Experts in cryptographical and mathematical inventions #

Our software team has substantial experience with cryptography- and mathematics-focused inventions.

If you’re developing improvements to digital signatures, get in touch with us to discuss your invention in a confidential environment, where we can use our experience and expertise to advise on how you should protect your invention.

The Financial Times logo featuring large "FT" initials above the words "FINANCIAL TIMES" on a beige background.
"IP STARS logo with text in dark blue and yellow, featuring a star symbol within the text, set against a plain background."
The word Legado500 in a large, elegant serif font with black lettering on a transparent background.
The IAM 300 logo features bold red and black text with a stylised red graphic element on a white background.
Three red rounded bars on the left and a large red M on the right against a black background.
A certificate with a grey background, displaying a score of 1000, awarded to Murgitroyd, recommended firm for 2025, featuring the IAM logo and bold text.
WTR 1000 logo in various shades of blue, gold, and black, with a geometric design and text on a transparent background.
The image displays the Lexology Client and Industry News logo with a pattern of dark circles and the words "LEXOLOGY" and "INDUSTRY NEWS".
A round badge with a white interior and gold border, featuring a gold eagle emblem, Chinese characters on a red ribbon, and the text "2024" at the bottom.
Logo of DéCIDEURS MAGAZINE featuring three shooting stars inside a circle and the magazine name in bold black and red text.
WIPR 2024 logo highlighting Diversity, with the tagline "Influential Woman in IP" on a teal background.
The Legal Benchmarking Social Impact Awards 2024 logo features a purple circle with "LBG" and bold black text to the right.
A colourful four-petal flower logo with a dark circle in the centre, accompanied by the text "IP INCLUSIVE" and the tagline "Working for diversity and inclusion in IP".
A colourful abstract logo with interconnected circles and the text "ADAPT.legal" underneath, set against a dark grey background.
European Patent Pipeline Program logo with the acronym "EPPP" in large pink letters above the full name in smaller dark blue text.
LSA logo with green text and leaf design, accompanied by black text reading "Legal Sustainability Alliance" and "Member | 2024".
A close-up of a cybersecurity badge featuring a blue background, green check mark, and the words "Cyber Essentials Certified."
A Cyber Essentials Plus logo featuring a blue and green circular emblem with a tick mark, accompanied by the text "CYBER ESSENTIALS PLUS".
The logo features the word "oveda" with a stylised, multicoloured swoosh design and the slogan “Invested in a better future” underneath.
Green and black logo featuring a stylised globe with wavy lines and the text "United Kingdom Best Managed Companies" beside it.
WIPO Rankings logo with "Highly Recommended Firm" and "UK Patents 2025" text in a mix of dark blue, light blue, and gold colours.