HID Global, a worldwide pioneer in trusted identity solutions launched an enterprise-grade service that enables users to verify the date and time of their electronically or digitally signed documents, code, and other files.

The service embeds an irrefutable date and time thereby binding the signer’s Public Key Infrastructure (PKI) digital certificate to the date and time of their signature.

IETF standards

HID Global has met the Internet Engineering Task Force (IETF) standards RFC 3161 requirements for operating as a Timestamping Authority (TSA). The company is also one of the world’s pioneering CAs and providers of digital certificate products.

Cloud-based platform

The HID IdenTrust Timestamping-as-a-Service offers a high-availability cloud-based platform for enterprises to embed timestamps to any software application, documents, or digital files by creating and embedding a trusted timestamp date and seal. Manipulation of the file breaks this seal and alerts the user that the file is no longer in its original state.

Digital identities

PKI digital certificates are strengthened through IETF X.509 verification using a trusted CA signature

PKI digital certificates are used to create trusted digital identities for many use cases. They are strengthened through industry-standard IETF X.509 verification using a trusted CA signature. The IETF’s PKI Time-Stamp Protocol (TSP) goes further to establish the signature’s “proof of existence” at an instant in time.

Trusted timestamps combat digital certificate forgery, prevent unauthorized use of revoked certificates, simplify time-based compliance record-keeping, strengthen legal claims, and prove long-term signature validity. Application examples include securing antivirus software updates with timestamped signatures.

Fingerprint with timestamp

Users connect to HID’s always-available Timestamping-as-a-Service to begin the process of creating their file’s unique identifying “fingerprint” and combining it with a trusted timestamp. The resulting timestamp token is sent to the client application and recorded with the file’s digital signature(s).

HID’s Digital Certificate and PKIaaS Offerings

HID’s offerings are critical for securing information and digital assets inside or outside the firewall

HID’s offerings are critical for securing information and digital assets inside or outside the firewall. They enable users to conduct e-commerce, authenticate to regulate and government websites, and secure communications between machines, network endpoints, cellphone devices, secure virtual servers, and IoT devices.

Availability

The HID IdenTrust Timestamping-as-a-Service is available at low-cost subscription tuition with a contractually guaranteed enterprise-grade Service Level Agreement (SLA).

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

  • Related companies
  • HID
  • View all news from
  • HID

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...