PRODUCT OVERVIEW
The TRIDENT Timestamp Server ensures the tamper-proof creation and authenticity of timestamps for any purposes. It is able to verify at all times, whether or not the timestamped data matches the exact same form at the point in time it was logged by the timestamp. The TRIDENT TSS can be run as an LCA (Local Client Application) integrated and protected by TRIDENT Hardware Security Module.
SECURITY
Integrated Hardware Security Module is certified in accordance with Common Criteria EAL 4+ certification (Evaluation Assurance Level EAL 4 augmented by AVA_VAN.5 and ALC_FLR.3 based on ISO/IEC 18045:2008) meeting the requirements of both the Protection Profile for Cryptographic Module for Trust Services (EN 419221-5) and the Protection Profile for QSCD for Server Signing (EN 419241-2) with strict conformance.
Our Partner Program was specifically designed to naturally reward the investments you make in selling our solutions, based on your sales performance
An easy-to-integrate HSM provides multiple functions for different use cases, offering an ideal solution for data protection challenges.
Trident HSM combines the high-level hardware security and multi-party computation to provide the highest level of data protection required in business.
The first eIDAS listed Remote Signature Solution with the Signature Activation Module (SAM) coming from the same vendor as the underlying Crypto Module (CM).
A Signature Formatting Server that is used for higher level signature formatting and a self-contained, fully functional module.
Contact us by filling out our online form
or send us an e-mail at info@i4p.com
Do you need support? For i4p support requests, please send
an e-mail to support@i4p.com or call +36 1 700 1230.
For press and media inquiries,
please send an e-mail to pr@i4p.com
Download this ebook to find out: