Cryptolog products successfully passed international interoperability testing

At Cryptolog, one of our key priority in product developpement is maintaining a high level of compliance of all our products with the latest standards, thanks to our experts involved in European and International standard bodies on electronic signature (Cryptolog is rapporteur of CAdES standard). To comply with this strategy, Cryptolog recently participated in The Remote Plugtests© Event on XAdES and CAdES signature standards organized by ETSI Plugtest™ Service. This professional unit of ETSI is specializing in running interoperability test events like this one, for a wide range of telecommunications, Internet, broadcasting and multimedia converging standards.


Serenity 2.6 welcomes TSL

Paris, March 8th, 2011 - Cryptolog is delighted to announce the release of version 2.6 of Serenity, its advanced electronic signature validation server. The main innovation in this release is the integration of Trust-service Status Lists (TSL) in the validation engine and in the Serenity administration interface.

A standard European format 

Imposed by the European Commission on its member states, TSL are designed to consolidate lists of suppliers of certification services that are considered trustworthy by the different EU states within public, standardized XML files that can be accessed online. The format of these lists has been standardized in Europe (ETSI TS 102 231). The lists are used to reference all trusted authorities in a given country and include a certain amount of technical and organizational information. In particular, these lists must indicate which certification authorities issue qualified certificates under the Electronic Signature Directive (e-signature 1999/93/EC).

Corinne David appointed Chief Financial Officer of Cryptolog

To support its development on the timestamping and electronic signature market, Cryptolog appoints Corinne David as head of administrative and financial management of the company.

How long does a timestamp seal "last"?

duree-horodatageWhenever we present Universign, we're often asked how long timestamping protection lasts. an estimated resistance to counterfeiting of around twenty years.

Baring any major technological breakthroughs that enable the corruption of the timestamping algorithms used or an obvious failure on the part of the timestamping authority, once a document is timestamped you will be able to legally prove for a period of around twenty years that you were in possession of it at the moment it was timestamped and that it has not been modified since.

However, for regulatory reasons related to our timestamping policy, the automatic verification by any third party of a timestamping seal associated with a document is limited in time. The rules of the regulatory frameworks in which we operate require us to limit the lifespan of the public information that enables a third party to validate a timestamp. For this reason, Universign guarantees that the validation of a timestamping seal associated with a document will be automatic and feasible by any third party for a period of five years after it is issued.

En route to online contracts signing

The Cryptolog development team has recently achieved an online demonstration of what could be an application of online contracts signing. You can find it at the following URL:

Unicity MSS 4.3 is released

Cryptolog starts new year 2011 by announcing a new release of Unicity MSS, its powerful electronic signature server, enabling mass signing of a very large flow of documents on behalf of a legal entity. With release 4.3, which replaces release 4.2 launched in August 2010, Unicity MSS has been enriched once again to meet the growing market requirements of electronic signature. This new version of Unicity MSS provides significant features for both administration and integration.

Signing files by depositing them in hot folders

This new software version enables to avoid the use of web services when signing documents, and thus offers a greater ease of integration: with version 4.3, it is possible to define active files or hot folders, where you just have to drop documents to automatically trigger their signature. After Unicity MSS has done the job, you will find the signed documents in an output directory, predefined in the configuration of hot folders.

Ensure the integrity and authenticity of electronic payslips.

Soft-IT relies on Cryptolog's technology and launches its solution of dematerialization of payslips, Cyberpaye.

Cryptolog enables IT-Soft to ensure the integrity and authenticity of payslips stored on Cyberpaye.

Since May 12, 2009, he is permitted to replace the paper payslip by an electronic version, subjected to certain conditions (agreement of the employee, data integrity and conservation of a copy for 5 years by the employer). Nevertheless, the paper payslips are still legion, when 50% of the employees are willing to move to electronic format.

New Business Development Director for CRYPTOLOG

Cryptolog announces the arrival of Gautier Harmel as Business Development Director.

In 2009, Cryptolog has confirmed that he was one of the key actors for all organisations with a dematerialisation project. With a turnover rise of 20%, in the current economic situation, Cryptolog wants to sustain this dynamics and to keep on progressing on the European market. In order to support this growth, Gautier Harmel has joined the managing team as Business Development Director.

Meet us at OMAT Milano 2010

Julien Stern, CEO of Cryptolog and Gautier Harmel, Business Development Director will be on March 30th and 31st, in Milano for OMAT Milano, the reference event in Italy for what concerns the electronic management of documents, content and business processes.

Unicity MSS 4.0 is now available!

Cryptolog's Mass Signing Server, Unicity MSS, is available from now in version 4.0. This new major version brings a lot of great functionalities, let's discover them!

PKCS#11 - Unicity MSS supports now any cryptographic device compliant with the PKCS#11 standard. In a few clicks, you can thus easily access cryptographic keys stored in hundreds of devices such as smartcards, USB tokens, or Hardware Security Modules.