FAQs about the TC TrustCreator

verify documents

With the help of checksums, two digital pieces of information can later be checked for their integrity. The required checksum is stored in the block chain during the signature process and is tamper-proof.

The document to be checked is processed on your end device by using modern web technologies. To do this, the checksum is calculated on your device, so your file never needs to be sent to a web server over the Internet.

The verification is completely anonymous, as no registration is required. In addition, we also do not save the IP address with the checksum, which is sent to the servers for the query. In order to guarantee your security, the transmission is exclusively carried out via encrypted connections.

If the document to be checked was issued in the past, the reply shall include information on the date of issue and the unique identity of the issuer.

In our free service the front part of the e-mail is replaced. The verifier can still be sure that the document was issued by a corresponding company (@trustcerts.de).

Our system works with a whitelist: everything that is not known is basically considered invalid. If the checksum was not found in the block chain, it was not signed using TrustCerts.

It is important to note that the file was not modified during this process. Compression algorithms for PDFs and images automatically generate a new checksum that does not match the old one.

Signing documents

Every digital file can be signed with the Trust Creator. The checksum is calculated on byte level, so that every digital file can be signed.

The signature is not attached to the file as for example in PDFs, but is documented in the block chain. Thus the file is not changed and all previously created copies automatically receive the manipulation protection.

The signature takes place on the user’s terminal device. This means that nobody, not even us, knows which file you want to protect against manipulation.

Our system stores the following information in the block chain:

  • Checksum of the file: is needed for the identity check.
  • Your signature: a verifier can verify that you are the issuer of the signature
  • Timestamp: When was the entry made in the block chain

The block chain protocols developed by us ensure that only one signature can be created for each checksum. This enables the unique identification of an issuer.

At this point, it is ensured that the document has been signed by a confirmed company address. Further security and validation mechanisms will be integrated to enable even more meaningful validation.

For data protection reasons, it is not possible to store the e-mail address persistently in the block chain. Therefore we replace the front part of the address with a pseudonym. The assignment to the correct e-mail address remains on our internal servers and can be deleted if necessary.

A reviewer can be sure that the present document was signed by an e-mail address of the company. For a user-defined abbreviation such as distribution@ please contact us.

During registration, a key pair is generated on your device, which is then used for signatures. The private key cannot be exported, so neither we nor hackers can steal your key from your device.

Only one device per user can be actively used. To switch to another device, a new registration link must be requested. This can then be activated on the new device.

The new key pair is automatically linked to the existing account, your old signatures will still be valid.

Your question was not answered?