HID Global, a worldwide pioneer in trusted identity solutions launched an enterprise-grade service that enables users to verify the date and time of their electronically or digitally signed documents, code, and other files.

The service embeds an irrefutable date and time thereby binding the signer’s Public Key Infrastructure (PKI) digital certificate to the date and time of their signature.

IETF standards

HID Global has met the Internet Engineering Task Force (IETF) standards RFC 3161 requirements for operating as a Timestamping Authority (TSA). The company is also one of the world’s pioneering CAs and providers of digital certificate products.

Cloud-based platform

The HID IdenTrust Timestamping-as-a-Service offers a high-availability cloud-based platform for enterprises to embed timestamps to any software application, documents, or digital files by creating and embedding a trusted timestamp date and seal. Manipulation of the file breaks this seal and alerts the user that the file is no longer in its original state.

Digital identities

PKI digital certificates are strengthened through IETF X.509 verification using a trusted CA signature

PKI digital certificates are used to create trusted digital identities for many use cases. They are strengthened through industry-standard IETF X.509 verification using a trusted CA signature. The IETF’s PKI Time-Stamp Protocol (TSP) goes further to establish the signature’s “proof of existence” at an instant in time.

Trusted timestamps combat digital certificate forgery, prevent unauthorised use of revoked certificates, simplify time-based compliance record-keeping, strengthen legal claims, and prove long-term signature validity. Application examples include securing antivirus software updates with timestamped signatures.

Fingerprint with timestamp

Users connect to HID’s always-available Timestamping-as-a-Service to begin the process of creating their file’s unique identifying “fingerprint” and combining it with a trusted timestamp. The resulting timestamp token is sent to the client application and recorded with the file’s digital signature(s).

HID’s digital certificate and PKIaaS offerings

HID’s offerings are critical for securing information and digital assets inside or outside the firewall

HID’s offerings are critical for securing information and digital assets inside or outside the firewall. They enable users to conduct e-commerce, authenticate to regulate and government websites, and secure communications between machines, network endpoints, mobile devices, secure virtual servers, and IoT devices.

Availability

The HID IdenTrust Timestamping-as-a-Service is available at a low-cost subscription fee with a contractually guaranteed enterprise-grade Service Level Agreement (SLA).

Download PDF version Download PDF version
  • Related companies
  • HID
  • View all news from
  • HID

In case you missed it

How can the industry do a better job of promoting emerging technologies in physical security environments?
How can the industry do a better job of promoting emerging technologies in physical security environments?

By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies ma...

Dahua & KITT Engineering's LED screen innovations
Dahua & KITT Engineering's LED screen innovations

About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have complete...

Protect assets with BCD's hybrid cloud NVR solutions
Protect assets with BCD's hybrid cloud NVR solutions

Like any retail franchise, car dealerships that have multiple locations nationwide require comprehensive, reliable, and scalable video surveillance solutions to protect their busin...

Quick poll
What is the most significant challenge facing smart building security today?