XiTrust Timestamp Server

The secure way of managing documents

Xitrust Timestamp ServerPlacing date stamps on paper documents is a standard practice. Timestamps are the electronic equivalent to this. They guarantee the authenticity of the content in a document at the time it is stamped.

Electronic timestamps are used above all for business-critical deadlines, times and transactions. Thus, they are extremely important and, above all, necessary for tenders, patents and legally relevant documents. Timestamps are also used in order to verify different electronic transactions in a company.

XiTrust offers the option of easily integrating timestamps for documents and emails into your electronic workflows.


Verify the content and timing of documents with retention requirements

Date stamps on paper-based documents represent a commonplace feature in companies.


  • Detailed log files for audit purposes.
  • The date stamp can be applied to electronic inbox documents – as with traditional mail.
  • This enables verifiability of the time of an archiving for documents with retention requirements.

Secure versioning of business-critical documents

In everyday business, the incoming mail stamp, above all for business-critical documents, is indispensable.


  • Use towards fulfillment of compliance requirements.
  • Sustainable documentation of electronic workflows.
  • Evidential value and long-term archiving of business-critical data.

Proof of authorship in a patent application or utility model

In order to protect technical inventions, it is necessary to register a patent or utility model.


  • Copyrighted works can be chronologically frozen.
  • Clear attribution of authorship.
  • RLegal and audit-compliant handling of processes.

Proof of timely transmittal of time-critical emails

Time-critical documents no longer need to be dispatched by mail in order to be legally binding.


  • Proof of timely transmittal of time-critical emails
  • Precise time reference by means of regular synchronization with an external time source (e.g. radio controlled clock).
  • Individual adaptation to the needs of users

  • Detailed log files for audit purposes via the requested timestamp. These log files can be additionally secured through regular backup by means of a timestamp from a third-party supplier (e.g. from a supplier of qualified timestamps).
  • The international standard RFC 3161, both in terms of the timestamp issued but also with respect to the available protocols for requesting timestamps.
  • Counter-signatures according to the Microsoft Authenticode for code signature, including timestamp, e.g. for macros in Microsoft documents. This ensures that your code signatures will also remain valid even after the signature certificate used has expired.

  • The requesting system creates a timestamp request. This request includes a calculated hash total of the document which the timestamp should be issued for.
  • The requesting system sends the timestamp request to the XiTrust Timestamp Server. The document itsself is not transmitted to the server.
  • XiTrust Timestamp Server generates the timestamp from the hash total and the request date. The timestamp is signed with an electronic signature and the process is logged for audit purposes.
  • XiTrust Timestamp Server sends the signed timestamp to the requesting system.

Success Stories
Success Stories

Solutions from XiTrust

successfully implemented with our customers

Success Stories

Any questions? Or do you need additional information?
Why not contact us today.