Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p>It sounds to me like you want a combination of a <a href="http://www.rsa.com/rsalabs/node.asp?id=2182" rel="nofollow noreferrer">digital signature</a> with a <a href="http://www.rsa.com/rsalabs/node.asp?id=2347" rel="nofollow noreferrer">secure digital timestamp</a>.</p> <p>In brief, after signing your data, you call a third party web service to provide an official timestamp and their own digital signature linking that timestamp to your signature value, thus providing evidence that the original signature (and thus the original data) was created on or before that date. With this scheme, even if the original signing key is later compromised, revoked or otherwise invalidated, any signatures that were made before the invalidation are still valid thanks to the timestamp.</p> <p>A tamper-resistant hardware signature device may help. If the target hardware is fairly recent it may have some support already on the motherboard in the form of a <a href="http://en.wikipedia.org/wiki/Trusted_Platform_Module" rel="nofollow noreferrer">TPM</a>, but there are plenty of vendors out there willing to charge an arm and a leg for their own <a href="http://en.wikipedia.org/wiki/Hardware_Security_Module" rel="nofollow noreferrer">hardware security modules</a>, or somewhat less for a <a href="http://en.wikipedia.org/wiki/Smart_card" rel="nofollow noreferrer">smart card</a>.</p> <p>Sufficient security may not be achievable by technology alone. You may need independent validation of the system. You may need remote CCTV monitoring and recording of the machine's location or other physical security measures to detect or stop tampering. You may need third-party code escrow, review and signing to ensure that the code loaded on the machine is what was intended, and to deter and/or detect the insertion of backdoor logic into the code.</p> <p>The bottom line is that how much money, time and effort you need to spend on this depends very much on what you stand to lose if records are forged.</p>
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
    3. VO
      singulars
      1. This table or related slice is empty.
    1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload