Reliable proof of existence and status of documents and electronic records at a specific point in time


Highly secure, reliable, and accurate timestamps

Timestamp for Utimaco's General Purpose HSMs allows the generation, storage, and usage of timestamping keys inside within the tamper-proof Hardware Security Module.

  • Reliable proof of the existence and the status of documents and electronic records at a specific point in time
  • Generation and usage of the timestamp key inside the tamper protected HSM
  • For all use cases requiring proof of time, e. g. lottery, gambling, eTender and service level agreements

Product Type:


Delivery Time:

About 2-4 weeks
Key Benefits

Key Benefits


Secure key generation, storage, and usage

Timestamping keys are generated, stored, and used inside the tamper protected HSM throughout their whole life to effectively protect them from theft or misuse.


High security level

The integrated HSM is certified according to FIPS 140-2 Level 3 and meets the requirements of ETSI Technical Specifications TS 102 023 and TS 101 861.


Designed for continuous operation in datacenters

Redundant field-replaceable power supplies and fans ensure continuity of operations. Remote monitoring and management reduce the Total Cost of Ownership.



Timestamp version for Utimaco General Purpose HSMs  – Highly secure, reliable, and accurate timestamps



The Timestamp firmware option allows you to generate, store, and use timestamping keys inside Utimaco’s secure, FIPS-certified Hardware Security Modules. The HSM reliably protects your timestamping keys against disclosure and manipulation. Its integrated high quality random number generator ensures the uniqueness of the timestamping keys and ensures an attacker cannot forge timestamps by guessing keys.

The Timestamp option meets the requirements of recognized policy specifica-tions like ETSI TS 102 023 “Policy Requirements for Timestamping Authorities” and TS 101 861 “Electronic Signatures and Infrastructures (ESI); Timestamping profile”. 

This extension enables our Hardware Security Modules to be an appropriate solution for notary systems and land records by the combination of a (qualified) signature and a timestamp proof possession of a good, documents management and archiv-ing systems that track the creation or archival date of documents as well as long-term archiving solutions where authenticity of documents is kept up to date over time by applying new timestamps in regular intervals, even in case the previous signatures are not secure anymore.

The solution can also be used for eTender and eAuction platforms where the validity of a quotation or a bid depends on its timely submission as for lottery and online betting where the prize can only be granted to lottery tickets that have been submitted before closing time. Additionally, it provides the solution for use cases requiring traceability of timely reaction to an inci-dent in critical infrastructures e. g. support and ticketing systems.


High security for the most valuable assets of your organization

  • Secure generation, storage, and usage of keys inside the tamper-protected HSM
  • High-quality true random number generator to ensure uniqueness of keys
  • Configurable role-based access control and separation of functions
  • 2-factor authentication with smartcards
  • “m of n” quorum authentication

Accurate time stamps

  • Network Time Protocol (NTP) for synchronization with external time server
  • Integrated GPS receiver or DCF77 receiver as optional hardware extension

Designed for continuous datacenter operations

  • Redundant field-replaceable power supply
  • Redundant field-replaceable fans
  • Remote management incl. remote software updates

Compliance with various security requirements

  • FIPS 140-2 Level 3
  • Available also with FIPS 140-2 Level 4 (physical security)
  • ETSI Technical Specification TS 102 023 “Policy Requirements for Timestamping Authorities”
  • ETSI Technical Specification TS 101 861 “Time stamping profile”    

Technical Specifications:

Supported cryptographic algorithms

  • RSA, key length up to 8,192 bits
  • Hash algorithms SHA-1, SHA-2, SHA-3, RIPEMD-160, MD5

Supported application interfaces

  • RFC 3161 timestamp protocol via HTTP or TCP, IPv4 and IPv6 network protocol
  • CryptoServer Timestamp API for general TimestampServer ad-ministration
  • -    PKCS #10 and PKCS #7 for request and import of Timestamp certificates


Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance

As a service

u.trust Timestamping Service

eIDAS Compliant Solutions for the Digitization of Business Processes.

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.