Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Trusted timestamping

Index Trusted timestamping

Trusted timestamping is the process of securely keeping track of the creation and modification time of a document. [1]

32 relations: Anagram, ANSI ASC X9.95 Standard, Bitcoin, Blockchain, CAdES (computing), Calculus, Computer security, Cryptographic hash function, Cryptography, Dashcam, Data integrity, Digital Postmarks, Digital signature, Galileo Galilei, Gottfried Wilhelm Leibniz, Hash function, Hooke's law, Isaac Newton, ISO/IEC 18014, Linked timestamping, Message authentication code, One-way function, PAdES, Public key infrastructure, Public-key cryptography, Robert Hooke, Smart contract, Timestamp, Timestamping (computing), Transient-key cryptography, Trusted third party, XAdES.

Anagram

An anagram is a word or phrase formed by rearranging the letters of a different word or phrase, typically using all the original letters exactly once.

New!!: Trusted timestamping and Anagram · See more »

ANSI ASC X9.95 Standard

The ANSI X9.95 standard for trusted timestamps expands on the widely used by adding data-level security requirements that can ensure data integrity against a reliable time source that is provable to any third party.

New!!: Trusted timestamping and ANSI ASC X9.95 Standard · See more »

Bitcoin

Bitcoin (₿) is the world's first cryptocurrency, a form of electronic cash.

New!!: Trusted timestamping and Bitcoin · See more »

Blockchain

A blockchain, originally block chain, is a continuously growing list of records, called blocks, which are linked and secured using cryptography.

New!!: Trusted timestamping and Blockchain · See more »

CAdES (computing)

CAdES (CMS Advanced Electronic Signatures) is a set of extensions to Cryptographic Message Syntax (CMS) signed data making it suitable for advanced electronic signatures.

New!!: Trusted timestamping and CAdES (computing) · See more »

Calculus

Calculus (from Latin calculus, literally 'small pebble', used for counting and calculations, as on an abacus), is the mathematical study of continuous change, in the same way that geometry is the study of shape and algebra is the study of generalizations of arithmetic operations.

New!!: Trusted timestamping and Calculus · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Trusted timestamping and Computer security · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Trusted timestamping and Cryptographic hash function · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Trusted timestamping and Cryptography · See more »

Dashcam

A dash cam, dashboard camera, car DVR, or car black box is one or a pair of onboard camera that continuously records (loop recording) the view through vehicle's windscreens.

New!!: Trusted timestamping and Dashcam · See more »

Data integrity

Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

New!!: Trusted timestamping and Data integrity · See more »

Digital Postmarks

A Digital Postmark (DPM) is a technology that applies a trusted time stamps issued by a postal operator to an electronic document, validates electronic signatures, and stores and archives all non-repudiation data needed to support a potential court challenge - it guarantees the certainty of date and time of the postmarking.

New!!: Trusted timestamping and Digital Postmarks · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Trusted timestamping and Digital signature · See more »

Galileo Galilei

Galileo Galilei (15 February 1564Drake (1978, p. 1). The date of Galileo's birth is given according to the Julian calendar, which was then in force throughout Christendom. In 1582 it was replaced in Italy and several other Catholic countries with the Gregorian calendar. Unless otherwise indicated, dates in this article are given according to the Gregorian calendar. – 8 January 1642) was an Italian polymath.

New!!: Trusted timestamping and Galileo Galilei · See more »

Gottfried Wilhelm Leibniz

Gottfried Wilhelm (von) Leibniz (or; Leibnitz; – 14 November 1716) was a German polymath and philosopher who occupies a prominent place in the history of mathematics and the history of philosophy.

New!!: Trusted timestamping and Gottfried Wilhelm Leibniz · See more »

Hash function

A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

New!!: Trusted timestamping and Hash function · See more »

Hooke's law

Hooke's law is a principle of physics that states that the force needed to extend or compress a spring by some distance scales linearly with respect to that distance.

New!!: Trusted timestamping and Hooke's law · See more »

Isaac Newton

Sir Isaac Newton (25 December 1642 – 20 March 1726/27) was an English mathematician, astronomer, theologian, author and physicist (described in his own day as a "natural philosopher") who is widely recognised as one of the most influential scientists of all time, and a key figure in the scientific revolution.

New!!: Trusted timestamping and Isaac Newton · See more »

ISO/IEC 18014

ISO/IEC 18014 Information technology — Security techniques — Time-stamping services is an international standard that specifies time-stamping techniques.

New!!: Trusted timestamping and ISO/IEC 18014 · See more »

Linked timestamping

Linked timestamping is a type of trusted timestamping where issued time-stamps are related to each other.

New!!: Trusted timestamping and Linked timestamping · See more »

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.

New!!: Trusted timestamping and Message authentication code · See more »

One-way function

In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input.

New!!: Trusted timestamping and One-way function · See more »

PAdES

PAdES (PDF Advanced Electronic Signatures) is a set of restrictions and extensions to PDF and ISO 32000-1 making it suitable for Advanced Electronic Signature.

New!!: Trusted timestamping and PAdES · See more »

Public key infrastructure

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

New!!: Trusted timestamping and Public key infrastructure · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Trusted timestamping and Public-key cryptography · See more »

Robert Hooke

Robert Hooke FRS (– 3 March 1703) was an English natural philosopher, architect and polymath.

New!!: Trusted timestamping and Robert Hooke · See more »

Smart contract

A smart contract is a computer protocol intended to digitally facilitate, verify, or enforce the negotiation or performance of a contract.

New!!: Trusted timestamping and Smart contract · See more »

Timestamp

A timestamp is a sequence of characters or encoded information identifying when a certain event occurred, usually giving date and time of day, sometimes accurate to a small fraction of a second.

New!!: Trusted timestamping and Timestamp · See more »

Timestamping (computing)

In computing timestamping refers to the use of an electronic timestamp to provide a temporal order among a set of events.

New!!: Trusted timestamping and Timestamping (computing) · See more »

Transient-key cryptography

Transient-key cryptography is a form of public-key cryptography wherein keypairs are generated and assigned to brief intervals of time instead of to individuals or organizations, and the blocks of cryptographic data are chained through time.

New!!: Trusted timestamping and Transient-key cryptography · See more »

Trusted third party

In cryptography, a trusted third party (TTP) is an entity which facilitates interactions between two parties who both trust the third party; the Third Party reviews all critical transaction communications between the parties, based on the ease of creating fraudulent digital content.

New!!: Trusted timestamping and Trusted third party · See more »

XAdES

XAdES (short for "XML Advanced Electronic Signatures") is a set of extensions to XML-DSig recommendation making it suitable for advanced electronic signatures.

New!!: Trusted timestamping and XAdES · See more »

Redirects here:

Cryptographic timestamps, Digital Time-Stamping Service, Digital timestamping, Time Stamping Authority, Time-Stamping Authority, Timestamping service, Trusted time stamp, Trusted timestamp.

References

[1] https://en.wikipedia.org/wiki/Trusted_timestamping

OutgoingIncoming
Hey! We are on Facebook now! »