CertCo was a financial cryptography startup spun out of Bankers Trust in the 1990s. The company pioneered a risk management approach to cryptographic services. It had offices in New York City and Cambridge, Massachusetts. It offered three main public key infrastructure (PKI) based products: an Identity Warranty system (tracking and insuring reliance on identity assertions in financial transactions); an electronic payment system (internally known as Acquire); and an (OCSP) responder for validating X.509 public key certificates. It went out of business in Spring 2002 never having found a wide market for its products despite filing a number of patents and developing new technology.
CertCo was founded in March 1994 by Frank Sudia] and Peter Freund as an internal bank department known as BT Electronic Commerce (BTEC). It spun out in November 1996 as CertCo with a number of outside strategic and financial investors in a transaction managed by Goldman Sachs.
Some of its better known early employees included Rich Ankney, Ed Appel, Alan Asay, Ernest Brickell, David Kravitz (inventor of the Digital Signature Algorithm), Yair Frankel, Dan Geer, C.T. Montgomery, Jay Simmons, Nanette Di Tosto, Paul Turner, Mark Jefferson and Moti Yung.
Early on it licensed the "Fair Cryptosystem" key escrow patents of MIT Professor Silvio Micali and announced plans to implement a "Commercial Key Escrow System". Thereafter the policy climate for key escrow turned negative, market interest waned, and the system was never built.
CertCo and Bankers Trust promoted the creation of a bank consortium to serve as a PKI certificate authority for global commerce, leading to the 1999 launch of Identrus, later renamed Identrust. The banks, however, declined to license CertCo's technology, opting instead for a vendor-neutral approach. Unlike the vendor-neutral approach, Certco promoted a risk management approach to PKI with transaction level insurance, and pioneered novel visionary approach to authentication in the financial sector: First, a distributed proactively secured certificate authority was designed and built (had it become a standard, it would have avoided a single control point over certificate authorities, and would have avoided coercion by that control point, and would have been further used to prevent attacks on the trust infrastructure, like the one on DigiNotar). Secondly, strong authentication of clients employing PKI and digital signatures was promoted, and if it had been widely used this would have reduced the effect of Phishing attacks, also envisioned as a possible threat to financial transactions).