A digital signature authenticates electronic documents in a similar manner a handwritten signature authenticates printed documents. This signature cannot be forged and it asserts that a named person wrote or otherwise agreed to the document to which the signature is attached. The recipient of a digitally signed message can verify that the message originated from the person whose signature is attached to the document and that the message has not been altered either intentionally or accidentally since it was signed. Also, the signer of a document cannot later disown it by claiming that the signature was forged. In other words, digital signatures enable the "authentication" and "non-repudiation" of digital messages, assuring the recipient of a digital message of both the identity of the sender and the integrity of the message.
A digital signature is issued by a Certification Authority (CA) and is signed with the CA's private key. A digital signature typically contains the: Owner's public key, the Owner's name, Expiration date of the public key, the Name of the issuer (the CA that issued the Digital ID), Serial number of the digital signature, and the digital signature of the issuer. Digital signatures deploy the Public Key Infrastructure (PKI) technology.
If you file electronically using digital signature you do not have to submit a physical copy of the return. Even if you do not have a digital signature, you can still e-File the returns. However, you must also physically submit the printed copy of the filled up Form along with the copy of the Provisional Acknowledgement Number of your e-Return.
Digital Signature Certificates (DSC) are the digital equivalent (that is electronic format) of physical or paper certificates. Examples of physical certificates are drivers' licenses, passports or membership cards. Certificates serve as proof of identity of an individual for a certain purpose; for example, a driver's license identifies someone who can legally drive in a particular country. Likewise, a digital certificate can be presented electronically to prove your identity, to access information or services on the Internet or to sign certain documents digitally.
- For secure email and web-based transactions, or to identify other participants of web-based transactions.
- To prove ownership of a domain name and establish SSL / TLS encrypted secured sessions between your website and the user for web based transactions.
- As a developer, for proving authorship of a code and retaining integrity of the distributed software programs.
- For signing web forms, e-tendering documents, filing income tax returns, to access membership-based websites automatically without entering a user name and password etc.
- For online e-tendering and Tax Filing –MCA 21, Notification from Central Board of Direct Taxes (CBDT), e-TDS returns
A digital signature works by creating a message digest which ranges from between a 128-bit and a 256-bit number which is generated by running the entire message through a hash algorithm. This generated number is then encrypted with the senders private key and added to the end of the message.
When the recipient receives the message they run the message through the same hash algorithm and generate the message digest number. They then decrypt the signature using the sender’s public key and providing the two numbers match they know the message is from who it says it’s from AND that is has not been modified.
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it.
Digital signatures rely on certain types of encryption to ensure authentication. Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Authentication is the process of verifying that information is coming from a trusted source. These two processes work hand in hand for digital signatures.
Yes, subsequent to the enactment of Information Technology Act 2000 in India, Digital Signatures are legally valid in India.
A digital signature is used to verify a message's authenticity. It is basically an encrypted hash of the message (message digest). The recipient can check if the message was tampered with by hashing the received message and comparing this value with the decrypted signature. To decrypt the signature, the corresponding public key is required.
A digital certificate is used to bind public keys to persons or other entities. If there were no certificates, the signature could be easily be forged, as the recipient could not check if the public key belongs to the sender. Thus, digital certificate is used to verify public key's authenticity.
A personal certificate identifies a person, and is issued by a trusted authority (called a Certificate Authority, or CA; more on this below). The authority says: "I, being a trusted authority, certify that the person presenting this certificate is so-and-so." How does it work? The trusted authority relies on somebody it knows and trusts to verify the identity of the person requesting a certificate. Once it gets assurance of the person's identity, the authority bundles into a document known as a "certificate" the following information: a description of who the person is, who it (the authority) is, a unique identifier that it gives to the person, and an electronic signature of all of these items. Along with a certificate, the person gets a program to encrypt and decrypt information.
1. Encrypt e-mail message
Only the recipient who has the private key that matches the public key used to encrypt the message can decipher the message for reading.
Private Key: The secret key kept on the sender's computer that the sender uses to digitally sign messages to recipients and to decrypt (unlock) messages from recipients.
Public Key: The key a sender gives to a recipient so that the recipient can verify the sender's signature and confirm that the message was not altered. Recipients also use the public key to encrypt (lock) e-mail messages to the sender.
2. Digitally signing a message
Digital signature include your certificate and public key.
Certificate: A digital means of proving your identity. When you send a digitally signed message you are sending your certificate and public key. Certificates are issued by a certification authority, and like a driver's license, can expire or be revoked.
Digital signatures for e-tendering are allowed, though with limited scope. The following transactions/instruments are not recognized as per the IT Act 2000:
- Negotiable Instrument as defined in section 13 of 26 of 1881. The Negotiable Instrument Act, 1881.
- A Power-of-Attorney.
- Succession Act/Will.
- Transfer of Immovable property
Yes, digital signatures can be employed in wireless networks.
The types of Digital Signature Certificates are mentioned below:
- Class I : These certificates do not hold any legal validity as the validation process is based only on a valid e-mail ID and involves no direct verification. Only Email address is authenticated
- Class II : An individual is verified against an established database and identity is verified with supporting documents. The identity of a person is verified against a trusted, pre-verified database.
- Class III : This is the highest level where the person needs to present himself or herself in front of a Registration Authority (RA) and prove his / her identity. An individual is physically verified and identity of individual and an organization is verified with supporting docs.
e-Token is a hardware mechanism used for password authentication via using identity management technique and provides hacking problem solution to the user. It looks similar to pen drive and fixes in the USB port of the computer. This device is beneficial for the corporate companies, organizations, libraries, banks, finance companies, education institutes, security provider companies and government and defense organizations. Besides this it is also very useful where there security is the must thing weather personal computer or cyber cafe pc. It can be most widely used in E-banking, E-commerce, stock trading, and online data and money transactions task.
In cryptography, certificate authority, or certification authority, (CA) is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or assertions made by the private key that corresponds to the public key that is certified. In this model of trust relationships, a CA is a trusted third party that is trusted by both the subject (owner) of the certificate and the party relying upon the certificate. CAs are characteristic of many public key infrastructure (PKI) schemes.
The IT Act 2000 details the prerequisites of a CA. Accordingly, a prospective CA has to establish the required infrastructure, get it audited by the auditors appointed by the office of Controller of Certifying Authorities. Subsequent to complete compliance of all requirements, a license to operate as a Certifying Authority can be obtained. The license is issued by the Controller of Certifying Authority, Ministry of Information Technology and Government of India.
A public-key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates.
In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique within each CA domain. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (RA). The RA ensures that the public key is bound to the individual to which it is assigned in a way that ensures non-repudiation.
The Controller of Certifying Authorities (CCA) is a Government of India undertaking that is involved in the monitoring and compliance of online security policy implementations in the country. These controls include
- CA key generation, storage, backup and recovery
- CA public key distribution and escrow
- CA key usage, destruction and archival
- CA cryptographic hardware life cycle management
- CA-provided subscriber key management
- Certification practice statement and certificate policy management
In accordance with Section 20 of the IT Act, NRDC is a national repository maintained by the CCA that contains all Digital Certificates and CRLs issued by all the licensed CAs. It also contains all the Digital Certificates and CRLs issued by the CCA through its RCAI. All Relying Parties are allowed to verify the authenticity of a CA's public keys from this repository.
RCAI is the Root Certifying Authority of India. It was established by the CCA under Section 18(b) of the IT Act and is responsible for digitally signing the public keys of all the licensed CAs in the country.
The RCAI root certificate is the highest level of certification in the country. The RCAI root certificate is a self-signed certificate.
The key activities of the RCAI include:
- Digitally signing licenses issued by CCA to CA
- Digitally signing public keys corresponding to private keys of a CA
- Ensuring availability of these signed certificates for verification by a Relying Party through the CCA or CA website
The Certificate Revocation List (CRL) is a list of certificates that have been revoked by the CA, and are therefore no longer valid.
The Certificate Practice Statement (CPS) is a statement of the practices that a Certification Authority (CA) employs for issuing and managing certificates. A CPS may take the form of a declaration by the CA of the details of its system's trustworthiness and the practices that it employs both in its operations and in its support of issuance of a certificate.
Certifying Authorities issue Digital Certificates that are appropriate to specific purposes or applications. A Certificate Policy (CP) describes the different classes of certificates issued by the CA, the procedures governing their issuance and revocation and terms of usage of such certificates, besides information regarding the rules governing the different uses of these certificates.
SSL stands for Secure Socket Layer. It might sound complex, but it's really not. SSL Certificates authenticate your website's identity, and encrypt the information visitors enter on your site. This keeps thieves from "overhearing" any exchange between that Web page and another computer. When you have an SSL Certificate protecting your website, your customers can rest assured that the information they send is secured and can't be viewed by cyber crooks.
An SSL (Secure Sockets Layer) certificate is a digital certificate that authenticates the identity of a website and encrypts information sent to the server using SSL technology. Encryption is the process of scrambling data into an undecipherable format that can only be returned to a readable format with the proper decryption key.
A certificate serves as an electronic "passport" that establishes an online entity’s credentials when doing business on the Web. When an Internet user attempts to send confidential information to a Web server, the user’s browser accesses the server’s digital certificate and establishes a secure connection.
An SSL certificate contains the following information:
- The certificate holder’s name
- The certificate’s serial number and expiration date
- A copy of the certificate holder’s public key
- The digital signature of the certificate-issuing authority
SSLSymantec SSL Certificates inspire trust and show visitors that you value their privacy. An SSL Cert protects your customers' sensitive information such as their name, address, password, or credit card number by encrypting the data during transmit from their computer to your Web server. SSL is the standard for Web security, and a Server Certificate is required by most merchant account services – you'll need one if you plan to accept credit cards on your site.
An SSL certificate ensures safe, easy, and convenient Internet shopping. Once an Internet user enters a secure area — by entering credit card information, email address, or other personal data, for example — the shopping site's SSL certificate enables the browser and Web server to build a secure, encrypted connection. The SSL "handshake" process, which establishes the secure session, takes place discreetly behind the scene without interrupting the consumer's shopping experience. A "padlock" icon in the browser's status bar and the "https://" prefix in the URL are the only visible indications of a secure session in progress.
By contrast, if a user attempts to submit personal information to an unsecured website (i.e., a site that is not protected with a valid SSL certificate), the browser's built-in security mechanism triggers a warning to the user, reminding him/her that the site is not secure and that sensitive data might be intercepted by third parties. Faced with such a warning, most Internet users will likely look elsewhere to make a purchase.
How you build your website is entirely up to you. In fact, most basic secure websites can be hand-coded using HTML. When a visitor enters an SSL-protected page on your website, their browser bar displays a padlock and the https:// prefix in the URL address. While most Internet users know to look for those SSL indicators, you can also add a site seal to your website to show visitors your site is verified and secured. Visitors can click the SSL site seal to view your certificate's status and details, seeing for themselves that it's safe to send sensitive information to your website. Websites protected by Go Daddy's Extended Validation SSL display a green browser bar as well, giving users the green light.
When an application receives digitally signed or secured content from the Internet, such as HTTPS-secured websites or signed software, it must verify that the certificate used to secure the content, such as an SSL or code signing certificate, is valid.
Applications, such as Web browsers and operating systems, validate certificates using Certification Revocation Lists or the Online Certificate Status Protocol.
Unlike other SSL certificates, Premium Extended Validation (EV) SSL certificates provide a prominent visual indicator that visitors can immediately recognize. Sites secured with an EV certificate display a green address bar, showing visitors that your organization's credentials have been authenticated according to a stringent, standardized vetting process.
Additionally, EV SSL certificates assure visitors that your organization is who it claims to be, and that they are not on a phishing site.
All SSL-protected sites display HTTPS in the address. Sites protected with a Premium EV SSL Certificate display a green browser bar to quickly assure visitors that the organization's legal and physical existence was verified according to strict industry standards. The Premium EV SSL Certificate requires the most extensive vetting process. We verify your control of the domain and the legitimacy of your company by validating the legal name, address, phone number and other business information. Issuance takes approximately 30 days, but we've got you covered during that time. EV SSL Certs come with a free Standard SSL to use during the vetting process, so you can keep your transactions secure.
For one thing, our SSL certs cover unlimited secure servers. They support up to 256-bit encryption and they're recognized by all of the major desktop and mobile browsers on the market. Plus, they're backed by the industry's best 24/7 phone service and support. There's absolutely no technical difference between CertificateTiger Certificates and those offered by other companies. Is it any wonder we're the largest provider of net new SSL Certificates in the world?
All of our SSL certificates support high-grade 256-bit encryption.
The actual encryption strength on a secure connection using a digital certificate is determined by the level of encryption supported by the user's Web browser and the Web server that the website resides on. For example, the combination of a Firefox browser and an Apache server normally enables up to 256-bit AES encryption with our SSL certificates. This means that depending on the browser and server that combine to establish the secure connection through one of our SSL certificates, the encryption strength of the secure connection may be 40, 56, 128, or 256 bit.
Some configurations require a specific type of SSL Cert. Do you need to cover multiple domains with a UCC (Unified Communications Certificate), or unlimited subdomains with a Wildcard SSL? Use these questions as a guideline to help find the SSL you need to cover multiple secure sites:
- Where are you located?
- Is this for a business or personal website?
- Which type of server of Web hosting do you use?
- How many unique domains do you want to secure with HTTPS?
- Do you need an SSL Certificate that supports Intel vPro technology for remote PC management? Check out our Deluxe Certificate.
- Do you run an Open Source project
Some websites or server configurations require a specific type of SSL. Use these questions as a guideline to help determine which SSL you should use.
Our SSL certificates work on all types of hosting and server configurations, but these specific servers must use the certificate listed:
- Quick Shopping Cart stores must use a single-domain Standard or Premium SSL.
- Intel vPro servers must use a Deluxe High Assurance SSL (available only via call-in).
- Exchange Server 2007 and 2010 must use a Multiple Domain (UCC) SSL to secure multiple services (domains).
All domains are listed in a UCC. If you want to secure both fully qualified (example: www.coolexample.com) and partially qualified (example: coolexample.com) domains with a UCC, make sure to select a domain for each one. Know which domains you need to cover when you purchase, because you cannot upgrade.
Do all of the sites have fully qualified domain names, or do you need to add a few subdomains (see What is a subdomain?) on the fly?
- Wildcard SSLs cover multiple subdomains. Wildcards are also ideal for intranet configurations. For example, you can secure your internal services using intranet.coolexample.com, and your public-facing website using www.coolexample.com.
- UCC SSLs can cover multiple subdomains, unique domain names, and websites. For example, you can secure www.coolexample.com, mail.coolexample.com, and www.awesomeexample.com.
UCC SSLs represent all secondary domains with the primary business name, so all sites should be related. A UCC site seal displays only the primary domain name as "Issued To," and all secondary websites are listed in the certificate details.
A subdomain is an easy way to create a memorable Web address for unique content areas of your site. For example, you could create a subdomain for pictures on your site called "pics" that is accessible through the URL pics.example.com in addition to www.example.com/pics.
After you purchase the SSL, take about 10-15 minutes to activate the credit and submit a request for the certificate to use on your website. We'll verify your request and keep in touch with you through the process. When the SSL Certificate is issued, we'll send you an email with details for completing installation, making your server a secure server.
- DGFT processes requests and issues Import and Export licenses
- DGFT has multiple schemes under which different licenses are issued
- There are hundreds of licenses which need to be processed every day
- Manual processing is slow and prone to abuse and corruption
Directorate General of Foreign Trade
DGFT DSC Uses Online
- Enable users to be able to file license applications online
- Enable software to handle different schemes like DEPB, EPCG, etc. automatically
- Approval of overall applications done online
- Speedier processing of the licenses
- Better MIS, audit trails and accountability
What is DGFT Digital Signature?
- User can login only using Digital Certificates which have IEC number
- User creates document (typically *.doc word file ) and digitally signs it
- A file is generated which is a digitally signed document and uploaded to the DGFT server
- Once the file reaches on server, it is again verified to make sure that no data tampering has happened during transit. This provides for integrity verification.
- Whenever, the file has to be reviewed, it can be verified to make sure that the file is not tampered with during static storage
A Digital Signature is required to digitally sign any documents in electronic format or for transactions being performed through a web-browser.
What is the use of DGFT Digital Signature Certificates?
DGFT Digital Signature is one of the many types of Digital Signature Certificates which is only provided by two certifying authorities (CA) in India i.e. (n)Code Solutions & Safe Scrypt. Safe Scrypt launch this product with name Safe EXIM or Safeexim or Safe-Exim where as (n)Code Solutions launch this with name (n)exim or (n)Exim or (n) Exim. Safe Scrypt is the most trusted brand in India and world wide on which many customers are dependence.
With a DGFT Digital Signature or Safeexim or (n)Exim you can apply for licenses electronically with the DGFT and digitally sign your online license application using your Safeexim or (n)Exim DGFT Digital Signature.
What is Safe Exim?
Safe Exim is a special kind of Digital Signature Certificate exclusively for the EXIM Community of India. It is issued to Organizations/ People who have obtained a valid IEC Code. It is mandatory to have a Safe Exim to able to communicate with DGFT online.
Benefits of DGFT Digital Signature / (n)Exim Digital Signature / Safe exim Digital Signature :
Who Can use DGFT Digital Signature or (n)Exim or Safeexim DGFT Digital Signature :
- Cost Savings - DGFT has extended attractive Monetary incentives amounting to 50 % waiver on license fee for those Exporters & Importers using DGFT Digital Signature Certificates or (n)Exim Digital Signature.
- Less Paper Work : DGFT Digital Signature also reduces paperwork considerably for the user, thus down the associated costs, Reduced Turnaround Time, Convenience.
- Security : Login to DGFT Portal using a DGFT Digital signature is far more secure than using a ID & Password
- Confidentiality, Integrity, Non-Repudiation, thus bringing Trust and Confidence into online experience.
- DGFT Digital Signature are opened to Only Importers - Exporters who have a valid IEC Code from DGFT Depertment.
- Any person from an EXIM Org. who is authorized to transact with DGFT on behalf of the Org.
1. Application Form duly filled in.
2. Latest Photograph of Applicant ( Must be Pasted on Form with Cross Signature )
3. Duly Attested Photocopy of anyone of the following ID Proof of Applicant :
4. Duly Attested Photocopy of anyone of the following Address Proof of Applicant :
- Driving License
- PAN Card Copy
- Govt. Issued ID Card
5. Proof of Right to do Business :
- Driving License
- Latest Utility Bill ( Telephone Bill / Mobile Bill / Electricity Bill / LIC Receipt / Water Bill ) - Not Older then three months
6. Copy of PAN Card of Organization.
- Certificate of Incorporation OR Memorandum and Articles of Association OR Registered Partnership Deed
- Valid Business License Document Like VAT / Service Tax Regn.
- Annual Report OR Income Tax Return OR Organization's Bank Account Details on Bank's Letter Head by Bank Manager
- Statement of Income by Chartered Accountants
7. Authorization Letter in favor of applicant on Company's Letter Head.
8. IEC Certificate Photocopy
- All Supportive Documents must be attested by Public Notary OR Gazetted Officer OR Bank Manager
- To obtain PAN Based Digital Signature, Photocopy of PAN Card is mandatory.
IEC Stands for IMPORTER EXPORTER CODE.
Any bonafide person/ company starting a venture for International trade.
No. IEC forms a primary document for recognition by Govt. of India as an Exporter/ Importer.
On the basis of IEC, companies can obtain various benefits on their exports/imports from DGFT, Customs, Export Promotion Council etc.
For those having registered office at Delhi, Gurgaon, Noida, Faridabad, Palwal, Meerut, Ghaziabad and Hardwar, Roorkee can submit applications at Zonal Jt. DGFT office, I.P. Bhawan, I.P Estate, New Delhi-110002. (Phone No. 23379115)
1. From where one can get IEC Form?
It can be downloaded from website (how to obtain iec option) or can be obtained from counter at Zonal JDGFT (CLA) office.
2. Can it be applied online?
Yes, The application can be filed online at www.dgft.gov.in for issue of new IEC.(Temporarily Unavailable)
3. Do I need to fill Aayaat-Niryaat Form after submission of online data?
No, after filing application online, take a print out and attach the necessary documents and submit. There are no additional requirements for filling form.
4. What are the documents needed for an IEC application?
Documents are listed below:
- Bank Receipt / Demand Draft details evidencing payment of application fee of Rs. 250/-. DD should be in favour of Zonal JDGFT, New Delhi.
- Certificate from the Banker of the applicant firm in the format given in Appendix 18A (Part B).
- Self certified copy of Permanent Account Number (PAN) issued by Income Tax Authorities.
- Two copies of passport size photographs of the applicant. Photograph on the bankers certificate should be attested by the banker of the applicant.
- Self addressed envelope duly stamped for Rs.15/-(for Local Address) & Rs.20/- (for Outstation).
- These documents may be kept securely in a file cover.
1. What is the fee for fresh IEC Application?
Application fee is Rs. 250/- which can be paid through Demand Draft / Pay Order from any designated bank in favour of Zonal Jt. DGFT, CLA, New Delhi. Treasury Receipt from the following designated Central Bank of India branches is also accepted:
2. What is fee for modification in IEC?
- Udyog Bhavan, New Delhi-110011.
- 10, Community Centre, Lawrence Road, Delhi-110 035
- 18/4 Asaf Ali Road, New Delhi 110 001.
- 55, Madhubani, Nehru Place, New Delhi - 110 019.
No fee is chargeable for modification in IEC, if informed within 90 days of such changes. After 90 days, a fee of Rs. 1000/- is charged.
3. What is fee for modification in IEC?
Rs.200/- payable in form of DD/TR.
1. Is PAN Number / PAN card essential? What are the alternatives?
Yes, PAN is mandatory. Photocopy of PAN card has to be submitted along with the application. If PAN card is not issued to the applicant then a copy of PAN allotment letter from I.T. Deptt will also be accepted.
2. Do I have to show PAN Card for verification?
**Only one IEC would be issued against a single PAN number. Any proprietor can have only one IEC number and in case there are more than one IECs allotted to a proprietor, the same may be surrendered to the Regional Office for cancellation.
1. How much time does it takes to get an IEC?
Normally two working days.
2. Can IEC be hand delivered/Over the counter?
No, IEC issued are dispatched through Speed Post.
Is there any Tatkal Scheme?
1. How may days are required to send the data to customs?
The data is automatically transmitted electronically on the day of issue of IEC.
2. Is IEC used by Custom department?
3. Can one check their IEC status at Customs on line?
Yes. Click on IEC (BIN) Status to know the status at customs.
1. What does the word “Online” mean?
The word “Online” means that the IEC issued by our office has been accepted by Customs.
2. Can I know the file number of application?
Yes, Click on option “Find Your File No. (Fresh IEC)”
3. Can we know the status of application through the web site?
Yes, Click on option “Status of IEC Application”.
4. How long does it take for an IEC to get “Online”?
Normally within 24 hours.
5. Can IEC data be modified after submission of application through web site?
No, only before submission data can be modified.
1. NRI-How an applicant (NRI) can apply?
NRI has to follow the normal application procedure. In addition permission from RBI/ FIPB is needed in some cases.
2. Procedure for a foreign national for obtaining IEC (documents needed)?
Board Resolution, Memorandum of Association, copy of Passport.
3. Do Foreigners require residence in India?
4. What is RBI’s Automatic approval for obtaining IEC?
Notification No. 20/2000/RBI dated. 3rd May, 2000.
5. In case the IEC is received undelivered, what are the documents required for proving the genuineness of the firm?
Information to Post Office, copy of Telephone Bill, Electricity Bill copy of Rent deed etc (any one) are required to confirm about the genuineness of the address.
6. Why PAN Card’s (both side) is required?
To identify issuing authority’s address.
7. Address of DGFT’s web site to check the status of IEC at Customs?
http://dgft.delhi.nic.in OR http://www.dgft.gov.in/dgftcla
8. Does one need authority letter at the time of submission of application?
1. What are the documents required for issue of Duplicate IEC?
Duly filled application form along with application fee of Rs.200/- , a copy of FIR and an affidavit on stamp paper of Rs.10/- duly notorised.
2. Can we apply online for for issue of duplicate IEC?
A Digital Signature certificate (DSC) is kept in Internet Explorer of computer system (PC) but keeping DSC on your computer system has following draw backs :-
- It can be misused by anyone who is having access to your computer system.
- DSC is lost if computer system is formatted or internet explorer is changed.
Accordingly, safe and proper method is to keep DSC on e-token
, a small USB port devise, which is password protected
The said e-token is a small hardware device and can be plugged to USB port of any system to digitally sign the documents and when not in use can be kept in safe custody.
||Used to securely store and transfer digital certificates, pre shared keys, and router configurations from the eToken to the router.
||Used to store and deploy router configurations and images from the USB Flash to the router.
- Typically used to store digital certificates, pre shared keys, and router configurations for IPSec VPNs.
- eTokens cannot store Cisco IOS images.
|Stores a file type that might be stored on a compact flash.
- Files can be encrypted and accessed only with a user PIN.
- Files can also be stored in a non secure format.
|Files can be stored only in a non secure format.
- The router can use the configuration stored in the eToken during boot time
- The router can use the secondary configuration stored in the eToken during boot time. (A secondary configuration allows users to load their IPSec configuration)
|Configuration file can be automatically transferred from the USB Flash to the router if the boot config command is issued (For example, boot config USB flash)