A recent Forrester report outlined several interesting trends – firstly, the adoption of e-signatures within businesses continues to grow steadily throughout the world and in Europe enterprises are engaging with e-signature providers for a broader set of digital services than their US counterparts.
Last year’s IoT Solutions World Congress was an opportunity for the industry to focus on the increasing influence of the Internet of Things in PKI planning. We attended the event with our technology partner Thales e-Security, which has just published a report with the Ponemon Institute looking at PKI trends across eleven countries.
Recently a vulnerability in the implementation of TLS protocol has been found called ROBOT (Return Of Bleichenbacher's Oracle Threat). This is the return of a 19-year-old vulnerability that allows RSA decryption and signing operations with the private key of a TLS server.
We’re pleased to announce that Ascertia has been ‘Highly Commended’ at this year’s UK IT Industry Awards in the Cloud Innovation Provider of the Year category!
Companies trading within the EU must comply with countless regulations every day, including directives specifically relating to VAT and electronic invoicing.
Launched in 2012, the G-Cloud framework has revolutionised how public sector departments access innovative IT solutions. By providing the UK Government the ability to procure services from approved cloud-based suppliers, IT costs have been driven down and efficiency increased.
This article discusses the features that should be on a highly desirable feature list when looking for an OCSP Responder product. Although the main focus of this topic is technical there are of course also commercial aspects that need consideration, these are summarised briefly at the end. The technical features explained here are all available and implemented in Ascertia ADSS OCSP Server, which is downloadable on trial basis.
It is clear that digital signatures are a very valuable security technique that enables data integrity (proving that the information has not changed since signing) and user authentication (proving who signed-off or approved the information). Digital signatures are now widely used in various industries and applications from signing of machine-readable travel documents to payment transactions to e-invoicing.
The ADSS Connector for SharePoint has always provided tight integration with the Microsoft SharePoint portal and ADSS Server Go>Sign Service. This allows enterprise users to "click and sign" on a document in SharePoint. The internal process first uploads the target document to ADSS Server, (converting the document to PDF/A if required) and then shows it to the user using the ADSS Go>Sign Viewer.
The ADSS Server Signing Service can create PDF digital signatures or all common ETSI PAdES formats (PAdES Part 2,3,4) and it can also create and apply visible signature appearances where requested. While other digital signature approaches have quite limited signature appearance functionality, the ADSS Server Signing Service includes a sophisticated and yet easy to use signature appearance designer. This enables administrators to create visible signatures that are optimised for their business purpose.
Hardware Security Modules (HSMs) are a fundamental part of a high trust solution. They offer fast, secure processing of private keys, which ensures that keys cannot be created, copied, changed or deleted without appropriate permission or stolen without being noticed. They also off-load the processing cost of digital signatures for high performance systems such as time stamping servers or certificate validation servers.
This article describes why RFC3161 compliant Time Stamp Authority (TSA) servers are needed and what to look for when choosing a Timestamp Authority (TSA) server. ETSI TS 101 861 and TS 102 023 also places important requirements for TSA services providers and these are also considered in this hot topic.
ADSS Server v4.8+ supports clever integration with Active Directory and other LDAP compliant directories to enable seamless and automatic management of each user’s digital certificate, including generation, revocation and re-issuance.
SSL Trust Issues
India's National Informatics Centre (NIC) has now joined the infamous Dutch CA DigiNotar in issuing fake and unauthorized digital certificates, yet again damaging the faith we place in Certification Authorities to provide high trust identity assurance.
Using PKI-based digital certificates has become a widely accepted means of electronic identity authentication for all kinds of purposes, from logical/physical access control to document signing, server authentication for e-commerce sites and software code authentication.
PDF documents have been common use within business for many years. Protecting PDFs against change is fast becoming a hot topic. Digitally signing PDFs with a certifying signature protects the content and also shows who signed or approved the document. This article explains how you can easily digitally sign PDFs, it covers what is needed to electronically sign PDF documents and the different types of PDF signatures.
Getting a document approved and signed-off is a crucial part of any business, be it an order, sales contract, claim forms, internal HR documents or any other type of document that needs to be clearly agreed and approved preferably with a clear audit trail.
PEPPOL is a large-scale European Commission project, working on allowing any company in the EU to be able to communicate electronically with any EU governmental institution for all procurement processes.
Within Europe a new digital signature format “PAdES” is gaining traction. PAdES stands for “PDF Advanced Electronic Signatures” and is a set of standards published by ETSI (TS 102 778 parts 1 to 5) to support European requirements for electronic signatures. The purpose is specifically for creation of long-term signatures that are verifiable for years or even decades.