FIG. 5 is a diagram showing message flow among a communications device, a client, and an identity verifier to perform a digital signature operation, according to an embodiment 500. The method of FIG. 5 may begin with a client computing resource transmitting at 505 a request to secure a transaction, such as a transaction requiring a digital signature. For example, a digital signature may be effected by forming two halves of a one-time key for a transaction, which may be difficult (or even virtually impossible) to replicate by an unscrupulous party attempting to forge a digital signature. A digital signature may involve creating or forming a signing key, which may be utilized by a communications device, and a confirmation key, which may be utilized by a client computing resource.