Other technologies


The timestamp or “time countermark” of a signature allows you to:  :

  • ensure the priority of the signature against the date timestamp
  • provide a reference date and confidence to determine the revocation status of a certificate


File conversion

In order to conserve documents with legal value, organisations need to ensure that their content is reliable and that semantics are stable over time.


Strong authentication

In order to protect their most sensitive and critical data, organisations are seeking authentication solutions to secure and track the access to that data by authorised and empowered users.


  • Strong authentication applet: LPAuth

Encryption and decryption

Encryption is the process of transforming information to make it unreadable to any person other than the recipient. Decryption is the reverse process of encryption, used to reconvert the information to a readable format. A cryptographic algorithm is a mathematical function used for encryption or decryption. In most cases, two additional functions are used: one for encryption and the other for decryption.


Code 2D-Doc

Comprising standard two-dimensional bar codes, 2D Doc involves securing data in a barcode, which is then signed electronically by the private key corresponding to a public key certificate placed in a “stamp server” type.

For a document, some data is chosen and then linked to a digital signature. The data and signature are formatted in a specific 2D-Doc barcode type.

This standard represents the only visible signature verifiable by a machine. What makes it different from regular electronic signing is the absence of the certificate in the signed document (thanks to the size of the barcode). Source: ANTS (Agence Nationale des Titres Sécurisées, National Agency of Secure Titles): http: / /www.ants.interieur.gouv.fr/ants/2D-doc.html