OBELISK Validator supports processing of all formats declared in eIDAS regulation and answers following questions:
Was a document created in a recognized format?
Does an electronic signature comply with required policies and limitations?
Was a document (signed data respectively) tampered with after an electronic signature has been created?
Are all the used cryptographic algorithms secure?
Is it possible to identify all of the signing certificates in an unambiguous and verifiable way?
Is a document stamped with a trustworthy electronic time stamp?
Were the signing certificates issued by a trustworthy certification authority?
Were the certificates used in electronic signature creation process valid and not revoked?
Are the certificates qualified?
Were the signatures created by a qualified signature creation device (QSCD)?
Validation process
In the perspective of the scope of facts being validated electronic signature validation process is precisely defined. But the validation results may differ depending on the assurance level requirements, or the signature properties. Results of the validation is directly influenced by a set of input parameters grouped into so called validation policy. OBELISK Validator supports specification of the validation policy (in XML) on the input of the validation along with the validated document.
The output of the validation of an electronic signature is detailed validation report in XML, which contains validation results of all evaluated attributes and properties of validated signature required by ETSI. Integral part of the validation output is a set of validation data gathered during the validation process.
OBELISK Validator benefits
Assurance of company processes compliance with eIDAS regulation in the area of electronically signed documents
Validation of electronically signed documents in all recognized formats and evaluation of their legal relevance across the EU
Validation of used certificates issued by trust service providers listed in TSLs across the EU
Simple integration with other information systems by web services
Supported standards
Validated el. signature formats | CAdES, PAdES, XAdES, ASiC, PKCS#7, XMLDSig, S/MIME, MS Office, OpenDocument, ZFO |
Validated signature classes | Basic Signature, Signature with Time, Signature with Long-Term Validation Material, Signature providing Long Term Availability and Integrity of Validation Material |
Validated signature levels | Baseline profile: B-B, B-T, B-LT, B-LTA Extended profile: E-BES, E-EPES, E-T, E-C, E-X, E-X-L, E-A, E-LTV |
Validation data formats | CRL, IETF’s OCSP protokol |
ETSI standards | Electronic Signatures and Infrastructures (ESI) – ETSI / CEN standards: ETSI EN 319 102 – Procedures for Creation and Validation of AdES Digital Signatures ETSI EN 319 122 – CAdES digital signatures ETSI EN 319 132 – XAdES digital signatures ETSI EN 319 142 – PAdES digital signatures ETSI EN 319 162 – Associated Signature Containers (ASiC) ETSI EN 319 172 – Signature Policies ETSI EN 319 312 – Cryptographic Suites ETSI EN 319 412 – Certificate Profiles ETSI TS 119 612 – Trusted Lists |
Service interface | Web |
Qualified service
OBELISK Validator QTS
Validation of electronic signatures and seals can also be solved by using a qualified trust service OBELISK Validator QTS.