T-RSSP API - Sign Hash

Hash Signing

Experience the efficiency and security of our Proof of Concept (POC) showcasing the T-RSSP API for streamlined and secure transactions. From registration to cryptographic validation, we ensure seamless access and authentication. Activate the Signer Interaction Component (SIC), credentials, and securely sign hashes for a robust cryptographic process.

Outlined below are the step-by-step procedures for efficiently onboarding users and guiding through the process of signing a hash:

Onboards new users with email addresses and mobile numbers. The application will send an account activation email to the user.

Users receive an account activation email after registering with their email addresses and mobile number.

In the email, users are provided with the account activation code, users can proceed by filling in the activation code provided.

The user sets up a passphrase.

The user requests their registration status

The user retrieves the activation code for the Signer Interaction Component (SIC)

The user gets the activation code for the Signer Interaction Component (SIC)

Users activate and initialize the Signer Interaction Component (SIC)

Users activate and initialize the Signer Interaction Component (SIC)

User SIC sends the activation token received from activation/initialize.

The application validates the SIC activation code, and if correct, the user is redirected to the home screen of the SIC Mobile App.

After verification of KYC or eKYC, the RA will issue and enroll the certificate to the user. The user can then request a list of credentials

User goes to certificate management screen to display the list of certificates.

The user requests an information of credentials.

User views the details of the certificate before activating it

This function activates the certificate.

User activate the credential.

This function sends a request to the RSSP to authorize the access to the credential for remote signing, according to the authorization mechanisms associated to it.

By activating the credential, the user confirms their ownership or authorization to use it, and the system can then grant access or privileges associated with that credential.

This API function offers digital file signing using the secure RSA algorithm and SHA-256 digest.

The system will send a push notification to the user's SIC mobile app, prompting them to approve or reject the signing request.

Once the request has been approved, the application return a signedHash.

Last updated