Provides a complete range of Web services for integrating the e-signature in applications. Designed to centrally incorporate e-signature generation, verification and complete mechanisms in accordance with the standards of ETSI CAdES, XAdES and PAdES.

  • Support for advanced e-signature standards and formats.
  • Batch signatures and batch verification.
  • Trust management for multiple CAs, both public and corporate.
  • Signature mechanisms are isolated from the applications to provide the centralized management of e-signatures.
  • Extendable and centralized logging that can be easily integrated with SIEM tools.



  • Advanced e-signature integration
    TrustedX acts as a centralized repository, which means the applications can remotely use the keys and certificates stored by TrustedX without having to store them locally. This approach provides greater, audited control over the use of keys and simplifies deploying, maintaining and using the PKI through centralized management. The authentication and access control provides a range of mechanisms and trust levels, and the system can be easily integrated with other repositories for managing identities.
  • Semantic interpretation of electronic signatures
    TrustedX is the most complete digital signature platform of its kind. Multiple CAs can be managed, all electronic signature formats are supported and all complexity related to managing trust is removed from the applications. The incorporated semantic services support obtaining all signer/signature data along with a trust level indicated using discrete values (4 levels) and labels (i.e., government, corporate, finance, etc.).
  • Cost saving and flexible integration
    The product can be quickly deployed thanks to its standardization and multiple integration options. It can be used (i) in user applications through plug-ins, (ii) as a Web service and (iii) via watched folders. The product incorporates an integration gateway that uses pipelines for the straightforward integration of data and common-task processing.
  • Centralized management, auditing and non-repudiation
    TrustedX provides the centralized management of all digital signature policies, the preservation of electronic signatures, and logging and auditing functionality. This allows control at the corporate level over the use of the cryptography, the effective management of recognized CAs/VAs, and the transparent maintenance of electronic signatures when required owing to the expiration of certificates or renewal of cryptographic material.


Signature Services: TrustedX incorporates functions that provide a set of security and trust mechanisms as services. These services can be used in different formats as they support different integration strategies:

  • Java or .NET APIs: Allows easily integrating electronic signature services in native Java applications and .NET (**).
  • SOAP/WS: Using the OASIS DSS standard as an access protocol for Web services.
  • REST/WS, SOAP/WS: Using TrustedX's integration gateway, which supports configuring traffic and data processing with an XML pipeline language.

Integration with other components: TrustedX can incorporate external repositories and mechanisms to support integration with other corporate tools.

  • LDAP/AD, RADIUS and databases for authentication, authorization and information retrieval.
  • Databases and SIEM tools for centralized logging.
  • HSMs for protecting the private keys of the applications.
  • OCSP/CRL and customized mechanisms for certificate validation.

The following service can also be added:

Watched folders:

  • Module that allows users and applications to use network folders to start unattended signature processes of one or more files.
  • TrustedX monitors the contents of a network folder, executing a series of actions on the files that are stored in this.
  • Once processed, TrustedX stored firms in an output folder, also accessible by network, including a report of the results.
  • TrustedX is known for supporting multiple watched folders and allow the definition of chained actions.
  • Appropriate for both users and applications. Signing entails simply copying and pasting to a folder.

(**) Please, check for availability.


The following figure illustrates the possible TrustedX architectures. The TrustedX functions can be used as a (i) trusted Web service, (ii) a trusted gateway between applications (iii) or a combination of (i) and (ii) (not shown in the figure).



Mobile World Congress
February 25 - 28, 2019 | Barcelona, Spain

Smart City Expo World Congress
November 13 - 15, 2018 | Barcelona, Spain

World eID and cybersecurity
September 24 - 26, 2018 | Marseille, France

September 3 - 7, 2018 | Barcelona, Spain

Security Document Worldecurity Document World
June 25 - 27, 2018 | London, United Kingdom

Digital Trust & Paperless Conference
April 24, 2018 | Prague, Czech Republic

RSA Conference
April 16 - 20, 2018 | San Francisco, USA

Govern Digital
March 21 - 22, 2018 | Barcelona, Spain

Mobile World Congress
February 26 - March 1, 2018 | Barcelona, Spain

Jornadas CERES
February 7 - 8, 2018 | Madrid, Spain

November 28 - 30, 2017| Cannes, France

World eID and Cybersecurity
September 25 - 27, 2017 | Marseille, France

Security Document World
June 26 - 28, 2017 | London, UK

eSignature in Public Administrations
June 7, 2017 | Madrid, Spain

June 5 - 7, 2017 | Szczecin, Poland

May 21 - 23, 2017 | Dubai, UAE

We use cookies to improve our website and your experience when using it. Cookies used for the essential operation of this site have already been set. To find out more about the cookies we use and how to delete them, see our Privacy Policy.I accept cookies from this site