Data Authentication

English | 日本語 | Eesti

Keyless Signatures

HomeKeyless Signatures

Keyless Signatures

Guardtime signatures authenticate electronic data, proving the signing time, signing entity and that not a single bit has changed since the signing time.

spacer Makes electronic data tamper-evident

Think of Guardtime as a lie detector for electronic data. It enables you to conclusively and irrefutably prove that the signed data has not been compromised.

spacer Signed data can be verified by anyone

Guardtime openly publishes all the tools needed to verify the signatures  with no need to consult any third party, including Guardtime.

spacer Keyless Signatures never expire

Guardtime signatures do not use any public or private cryptographic keys for the purposes of verification thereby ensuring that the integrity and authenticity properties of the data will never expire.

Keyless Signatures are a combination of hash function based server-side signatures and hash-linking based digital timestamping delivered using a distributed and hierarchical infrastructure. The digital timestamping component of the service is officially certified and Guardtime is accredited as a timestamp authority by the European Union. See here for more details.

 

To enable keyless signatures for your electronic data:

  1. Download free keyless signature software
  2. Sign-up for free public keyless signature service
-or-
Contact us to set up a commercial service account
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.