SOLUTIONS

Secure Timestamping Service for Enterprises

Establish secure, trusted timestamps and authenticate digitally signed data with Time Stamping Authority (TSA) — provide longevity of digital signatures for compliance, financial and legal transactions.

Long-Term Signatures With Trusted Timestamps

HID Timestamping-as-a-Service helps organizations reduce risk by providing long-term digital signature validation across a variety of use cases, including timestamping for code and documents.

It delivers a digital seal of data integrity and a trusted date and time of the transaction.

pen icon

Digital Document Signing

software code icon

Software Code Signing

phone icon

Mobile Application Code Signing

wrench and cog icon

Firmware Signing

shield icon

Antivirus Signature File Signing

dollar sign

Financial Transaction Signing

What is a Timestamp?

Create a trusted timestamp with Time Stamping Authority (TSA) using any software tool that complies with the RFC 3161 Time Stamping Protocol (TSP), such as Microsoft SignTool, Authenticode or other similar applications.

The hash is combined with the trusted timestamp and is signed with its private key. 2 Hash HID IdenTrust Timestamping-as-a-Service Hash Timestamp Timestamp Token The client application receives the timestamp token. The client application requests a timestamp for a document or software code and a hash is generated. The timestamp token is recorded in the document or software code that contains X.509 digital signatures. PDF 0111 1010 0111 1010 DOCX > 3 1 4

Explore the Breadth of HID’s PKI Solutions and Services

Establish security across all your networks and devices using a subscription-based cloud service or discrete digital certificates to solve the pain points of large complex organizations, medium-sized enterprises and small businesses.

software code icon

Software Code Signing

Ensure code integrity on executables, firmware, drivers and apps to establish trust and a greater level of confidence
Visit IdenTrust
connectivity icon

PKIaaS

Automate and scale certificate provisioning for every system and device with a flexible, cloud-based managed PKI solution
Learn more
lock icon

Enterprise SSL

Secure every server with one low, fixed subscription fee and the flexibility to mix and match certificate types
Learn more

Frequently Asked Questions

1. What is timestamping for code?

Timestamping for code involves applying a trusted timestamp to software code to verify its integrity and ensure it hasn’t been altered after the timestamp was applied. This process complies with RFC 3161 standards.

2. How does timestamping for documents work?

Timestamping for documents uses a Time Stamping Authority (TSA) to apply a trusted timestamp to a document, providing proof that the document existed at a specific time and has not been altered since.

3. Why is long-term validity important for digital signatures?

Long-term validity ensures that digital signatures remain verifiable long after they were applied, crucial for legal, financial, and compliance purposes.

4. What is the RFC 3161 Time Stamping Protocol (TSP)?

RFC 3161 is a standard protocol for time stamping, ensuring that timestamps are applied in a secure and interoperable manner across different software and systems.

5. How does HID Timestamping-as-a-Service ensure data integrity?

HID Timestamping-as-a-Service combines the hash of your data with a trusted timestamp, then signs it with a private key to create a timestamp token, ensuring data integrity and non-repudiation.

6. Can timestamping prevent forgery?

Yes, timestamping can prevent forgery by providing a verifiable date and time stamp that proves when a document or piece of code was signed, making unauthorized alterations easily detectable.

7. What are the benefits of using a TSA-compliant tool for timestamping?

Using a TSA-compliant tool ensures that your timestamps are secure, trustworthy, and compliant with industry standards, providing a reliable way to verify the integrity and authenticity of your data.

connectivity icon

PKI-as-a-Service (PKIaaS)

HID PKIaaS increases security, eliminates operational complexity and dramatically reduces costs related to operating and deploying an organization's managed PKI.

Read the executive brief
pen icon

Timestamping-as-a-Service

Timestamping Authority can prevent such forgery and create longevity for digital signatures of document or software application code.

Read the datasheet

Need Help Getting Started?

Our experts are here to help your organization figure out your first move.

Let's get going