Posted by Robert G Laurin on February 26, 2010 at 08:40:20:
In Reply to: Re: Electronic signatures posted by Jim Guerber on February 25, 2010 at 19:15:14:
Done something similar a while back - without the use of a SDK.
I installed USB scanners in the accounting department where they enter credit card information for contracts.
Process runs like this:
- They scan the document, the TIFF image is saved in the local TMP folder.
- Operator hits F4 in the Contract Screen which launches a Comet routine to take care of the image:
- Comet program scans the folder for any .TIF files
- renames them current customer number + a sequence number
- Encrypts the file using a launched command line encrypter
- Copy the encrypted image to a secured image folder on a server
- displays the TIF by Launch&Wait (need to tweak windows to open .TIF using image viewer in file associations)
- once the viewer is closed, Comet program resumes and erases the TIF and the encrypted file from local system
- program exits
- Operator finish entering data
- Operator shred original contract with sensitive data.
To review images in the future:
- Operator recalls customer on contract screen
- Hits F5 (gets a list of saved document)
- Pick which wants to see
- Decrypt TIF to local TMP folder
- Display Image (Launch&Wait)
- Destroy local copy of image
Obviously, for security reason, lots of security restrictions are in place and all activities are logged.
Yes, this is what I have to do for PCI Compliance.
Each file can be a maximum of 1MB in length Uploaded files will be purged from the server on a regular basis.