What is Code Signing?
Comodo Extended Validation (EV) Code Signing gives your customers the peace of mind to download your software. Your EV Code Signing certificate also features an added layer of security—your private key will be physically stored on an external hardware token. This eliminates any risk of unauthorized use of your code signing certificate.
Buy New OR Renew Your Comodo Code Signing Certificates
When customers download software signed with a Code Signing Certificate issued by Comodo, they can be assured of:
Users benefit from this software accountability because they know who published the software and that the code hasn't been tampered with. In the extreme case that software performs unacceptable or malicious activity on their computers; users can also pursue recourse against the publisher. This accountability and potential recourse serve as a strong deterrent to the distribution of harmful code. Developers and Web masters benefit from Code Signing because it builds trust in their names and makes it more difficult to falsify their products. By signing their code, developers build a trusted relationship with users, who learn they can download software signed by that publisher or Web site with confidence. With Code Signing Certificates, developers can create exciting Web pages using signed ActiveXT controls, or other signed executables. And users can make educated decisions about what software they want to download, knowing who published the software and that it hasn't been tampered with.
Code signing is widely used to protect software that is distribut ed over the Internet. Code signing does not alter it; it simply appends a digital signature to the executable code itself. Use digital signatures when you want to distribute data, and you want to assure recipients that it does indeed come from you. This digital signature provides enough information to authenticate the signer as well as to ensure that the code has not been subsequently modified. Code signing digital IDs (or certificates) allow content publishers including software developers to sign their content that includes software objects, macros, device drivers, firmware images, virus updates, configuration files or other types of content for secure delivery over the Internet.
Digital signatures are created using a public-key signature a lgorithm such as the RSA public-key cipher. A public-key algorithm actually uses two different keys: the public key and the private key (called a key pair). The private key is known only to its owner, while the public key can be available to anyone. Public-key algorithms are designed so that if one key is used for encryption, the other is necessary for decryption. Furthermore, the decryption key cannot be reasonably calculated from the encryption key. In digital signatures, the private key generates the signature, and the corresponding public key validates it.
Features & Benefits of Code Signing Digital Ids
Extended Validation
Comodo Extended Validation Code Signing certificates offer the highest level of identy authentication available. Comodo will ask your company to undergo an extensive vetting process in order to verify identity.
Requires Physical Token to Sign Code
Private keys are stored on an external hardware token which is required in order to sign code, eliminating the possibility that your certificate could be exported and used by unauthorized personnel
Customer Confidence
Code Signing Digital ID protects (reassures) your customers by assuring them that the integrity of the code they download from your site is intact - that it has not been tampered with or altered in transit.
Authenticity
After downloading, end users can be sure that the code they obtained really c ame from you, helping you preserve your business reputation and intellectual property. Digital IDs allow customers to identify the author of digitally signed code and contact them should an issue or query arise.
Seamless Integration with In dustry-Standard Technology
Most browsers will not accept action commands from downloaded code unless the code is signed by a certificate from a trusted Certificate Authority, such as Comodo.
Ease of Use
Code signing certificates are easy to use in conjunction with the vendor software tools that developers use to create products, macros and objects.
How does Authenticode work with Comodo Digital IDs?
Authenticode relies on industry standard cryptography techniques such as X.509 v3 certificates and PKCS #7 and #10 signature standards. These are well-proven cryptography protocols, which ensure a robust implementation of code signing technology.
Authenticode uses digital signature technology to assure users of the origin and integrity of software. In digital signatures, the private key generates the signature, and the corresponding public key validates it. To save time, the Authenticode protocols use a cryptographic digest, which is a one-way hash of the document.
We uses cookies to remember and process the items in your shopping cart as well as to compile aggregate data about site traffic and interactions so that we can continue improving your experience on our site.