Elliptic Curve Cryptography and Certicom implementations add fast and secure digital signature capability to ImageNow products
MISSISSAUGA, Ontario – (October 28, 2004)– Certicom Corp. (TSX: CIC), the authority for strong, efficient cryptography, that Perceptive Software, known for its innovative document imaging, management and workflow software, has licensed Security Builder® PKI™ software developer toolkit. For Perceptive Software, the toolkit will enable its developers to quickly and easily add digital signature functionality to its ImageNow® suite of products. Perceptive Software's customers benefit because they can now use digital signatures natively to approve documents, thereby eliminating additional steps and saving time. And, because the Perceptive Software team chose to use elliptic curve cryptography (ECC) algorithms, customers can expect the process to be fast and secure, regardless of the number of documents being signed.
Enterprise customers use Perceptive Software's solutions to electronically capture, index and store documents in one central repository, which allows users to search, route and view the documents from any business application. These capabilities create measurable efficiencies, and by enabling their customers to approve documents electronically, the approval workflow process is shortened even more.
In sourcing a solution, the Perceptive Software team had two overriding criteria. It had to be a proven technology and it had to be fast. The team ruled out open-source admitting that the associated costs were too great, especially in light of patent indemnifications and the ongoing need for code updates and maintenance. Given that many of their customers handle sensitive documents-healthcare, financial, government and human resource markets-the team wanted trusted implementations backed by cryptography experts who could provide ongoing support and code maintenance. Speed was critical because the solution would have to handle a large number of documents.
"We initiated a competitive process but were quickly focused on Certicom and its technologies around ECC, which had the speed and strength we need," said Darren Knipp, senior product manager at Perceptive Software. "Not only was the Certicom team responsive, it was backed by 20 years of experience with ECC and validation from security-sophisticated customers like the National Security Agency and Motorola."
Convinced of the merits of ECC, Perceptive Software's checklist didn't stop with the technology. They had certain expectations for the toolkits, all of which were met. Knipp describes the Certicom toolkits as extensive and flexible. Not only are all of the functions for digital signatures available, including verification, hashing, authentication and certificate and trust validation, developers are given implementation options. "We really liked the ability to get to the low-level API components," said Knipp.
"By choosing ECC, and Certicom's toolkits to implement it, the Perceptive Software team is meeting and exceeding their customers' expectations. They are providing strong security to protect sensitive documents and technology that will not impact user experience," said Ian McKinnon, president and CEO of Certicom. "As ECC adoption continues to grow, enterprises will begin to ask for it and Perceptive Software will already be ahead of the curve."
About Perceptive Software
Founded in 1988, Perceptive Software, Inc., (formerly Perceptive Vision) develops document imaging, management and workflow software solutions that simplify document management processes by delivering secure, digitized versions of paper and other electronic documents while leveraging existing applications. More than 800 customers in a broad range of industries worldwide have taken advantage of ImageNow, Perceptive Software's flagship software offering. For more information about Perceptive Software and ImageNow, visit www.imagenow.com.
Certicom Corp. (TSX:CIC) is the authority for strong, efficient cryptography required by software vendors and device manufacturers to embed security in their products. Adopted by the US Government’s National Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography (ECC) provide the most security per bit of any known public key scheme, making it ideal for constrained environments. Certicom products and services are currently licensed to more than 300 customers including Motorola, Oracle, Research In Motion, Terayon, Texas Instruments and Unisys. Founded in 1985, Certicom is headquartered in Mississauga, ON, Canada, with offices in Ottawa, ON; Reston, VA; San Mateo, CA; and London, England. Visit www.certicom.com.
Certicom, Security Builder, Security Builder Crypto, Security Builder GSE, Security Builder IPSec, Security Builder Middleware,Security Builder PKI, Security Builder SSL, movianVPN, movianCrypt and movianMail are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders.
Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.
The shares of the company described above have been offered only to qualified institutional buyers in reliance on Rule 144A under the Securities Act of 1933, as amended (the "Securities Act"), and outside the United States pursuant to Regulation S of the Securities Act. The shares have not been registered under the Securities Act and may not be offered or sold in the United States or to a U.S. Person absent registration or an applicable exemption from registration requirements.
This press release does not constitute an offer to sell or the solicitation of an offer to buy any security and shall not constitute an offer, solicitation or sale in any jurisdiction in which such offering would be unlawful.
For further information, please contact:
|Tim Cox||Brendan Ziolo|
|(650) 369-7784||(613) 254-9267|